TestOut IT Fundamentals Pro v2.1.x Accessibility Document Modified: 2021-04-28

TestOut IT Fundamentals Pro - English 2.1.x ACCESSIBILITY DOCUMENT


TestOut IT Fundamentals Pro – v2.1.x Accessibility Document

NOTE: This document is to be used only by authorized instructors and students who have accessibility needs. Other use or distribution is prohibited.

TestOut IT Fundamentals Pro – v2.1.x Accessibility Document 1

1.0 Course Overview ...........................................................................................................................................................

14

1.1 Chapter Introduction

. 14

1.2 What Is Information Technology?

. 15

1.2.1 IT, IS, and CS (Lesson Video)

. 15

1.2.2 Course Overview

. 16

1.2.3 Course Objectives

. 20

1.2.4 Activity: Career Exploration

. 33

1.2.5 Section Quiz (Section Quiz)

. 34

1.3 Technology and Ethics

. 36

1.3.1 Technology and Ethics (Lesson Video)

. 37

1.3.2 Technology and Ethics Facts

. 38

1.3.3 Survey of Relevant Ethical Issues

. 39

1.3.4 Section Quiz (Section Quiz)

. 41

2.0 Information Technology Basics 44

2.1 Chapter Introduction

. 44

2.2 Introduction to Computers

. 44

2.2.1 Introduction to Computers (Lesson Video)

. 46

2.2.2 Computer System Facts

. 46

2.2.3 History of Computers (Lesson Video)

. 47

2.2.4 Computer History Facts

. 48

2.2.5 Supercomputers

. 49

2.2.6 Human-Computer Interaction

. 51

2.2.7 Section Quiz (Section Quiz)

. 53

2.3 Digital Data

...............................................................................................................................................................................................

59

2.3.1 Number Systems (Lesson Video)

. 60

2.3.2 Number System Facts

. 61

2.3.3 Digital Information (Lesson Video)

. 61

2.3.4 Digital Information Facts

. 62

2.3.5 Data Representation (Lesson Video)

. 64

2.3.6 Data Representation Facts

. 65

2.3.7 Section Quiz (Section Quiz)

. 66

2.4 Media Formatting

. 76

2.4.1 Digital Sound and Video (Lesson Video)

. 78

2.4.2 Digital Sound and Video Facts

. 79

2.4.3 File Compression (Lesson Video)

. 79

2.4.4 File Compression Facts

. 80

2.4.5 Digital Audio Formats

. 81

2.4.6 Digital Video Formats

. 83

2.4.7 Digital Images (Lesson Video)

. 86

2.4.8 Digital Image Facts

. 87

2.4.9 Digital Image Formats

. 88

2.4.10 3D Models

. 90

2.4.11 Activity: Compare Digital Media

. 92

2.4.12 Section Quiz (Section Quiz)

. 93

2.5 Digital Media Careers

. 98

2.5.1 Careers in Digital Media (Lesson Video)

. 98

2.5.2 Digital Media Career Facts

. 99

2.5.3 Interview: Video Production Specialist (Lesson Video)

. 99

2.5.4 Section Quiz (Section Quiz)

. 100

3.0 Computer Hardware 101

3.1 Chapter Introduction

. 101

3.2 Computing Devices

. 101

3.2.1 Computing Devices (Lesson Video)

. 102

3.2.2 Computing Device Facts

. 103

3.2.3 Activity: Research Computing Devices

. 107

3.2.4 Section Quiz (Section Quiz)

. 107

3.3 Internal Components

. 118

3.3.1 Internal Computing Components (Lesson Video)

. 121

3.3.2 Internal Computing Component Facts

. 122

3.3.3 Electrostatic Discharge (Lesson Video)

. 125

3.3.4 The Fetch-Execute Cycle (Lesson Video)

. 126

3.3.5 CPU Types (Lesson Video). 128

3.3.6 CPU Facts

. 128

3.3.7 Motherboards and Expansion Cards

. 130

3.3.8 Power and Cooling Options

. 134

3.3.9 Explore the Motherboard (Demo Video)

. 136

3.3.10 Explore the Motherboard (Simulation)

. 137

3.3.11 Install Memory (Demo Video)

. 138

3.3.12 Install Memory (Simulation)

. 138

3.3.13 Upgrade a Video Card (Demo Video)

. 139

3.3.14 Upgrade a Video Card (Simulation)

. 139

3.3.15 Section Quiz (Section Quiz)

. 141

3.4 Input and Output

. 154

3.4.1 Input/Output Hardware (Lesson Video)

. 156

3.4.2 Input/Output Hardware Facts

. 157

3.4.3 External Device Interfaces (Lesson Video)

. 162

3.4.4 Installing External Devices (Lesson Video)

. 163

3.4.5 External Device Facts

. 164

3.4.6 Touchscreens

. 171

3.4.7 Printers (Lesson Video)

. 173

3.4.8 Printer Facts

. 174

3.4.9 How Cameras Work (Lesson Video)

. 175

3.4.10 Connect a Monitor (Demo Video)

. 176

3.4.11 Connect a Monitor (Simulation)

. 176

3.4.12 Install Peripherals (USB Devices) (Demo Video)

. 177

3.4.13 Install Peripherals (USB Devices) (Simulation)

. 178

3.4.14 Set Up a Computer (Demo Video)

. 179

3.4.15 Set Up a Computer (Simulation)

. 180

3.4.16 Section Quiz (Section Quiz)

. 182

3.5 Storage

..................................................................................................................................................................................................

.. 197

3.5.1 Storage Types (Lesson Video)

. 199

3.5.2 Storage Facts

. 200

3.5.3 Emerging Storage Technologies

. 205

3.5.4 Install SATA Devices (Demo Video)

. 207

3.5.5 Install SATA Devices (Simulation)

. 208

3.5.6 Files and File Systems (Lesson Video)

. 209

3.5.7 File System Features (Lesson Video)

. 210

3.5.8 File System Facts

. 210

3.5.9 Drives and Partitions

. 213

3.5.10 Disk Defragmentation (Lesson Video)

. 214

3.5.11 Create Volumes (Demo Video)

. 214

3.5.12 Create Volumes (Simulation)

. 214

3.5.13 Format Drives (Demo Video)

. 216

3.5.14 Format Drives (Simulation)

. 216

3.5.15 Perform Disk Maintenance (Demo Video)

. 217

3.5.16 Perform Disk Maintenance (Simulation)

. 218

3.5.17 Section Quiz (Section Quiz)

. 219

3.6 Hardware Troubleshooting

. 236

3.6.1 Troubleshooting (Lesson Video)

. 237

3.6.2 Troubleshooting Facts

. 238

3.6.3 Motherboard

Troubleshooting. 242

3.6.4 Memory Troubleshooting

. 244

3.6.5 Processor Troubleshooting

. 246

3.6.6 Storage Troubleshooting

. 250

3.6.7 Troubleshoot System Power (Demo Video)

. 253

3.6.8 Troubleshoot System Power (Simulation)

. 253

3.6.9 Troubleshoot Memory (Demo Video)

. 254

3.6.10 Troubleshoot Memory

(Simulation). 254

3.6.11 Troubleshoot Processor Installation (Demo Video)

. 255

3.6.12 Troubleshoot Processor Installation (Simulation)

. 256

3.6.13 Troubleshoot SATA Devices (Demo Video)

. 257

3.6.14 Troubleshoot SATA Devices (Simulation)

. 258

3.6.15 Section Quiz (Section Quiz)

. 260

3.7 Computer Hardware Careers

. 271

3.7.1 Computer Hardware Careers (Lesson Video)

. 271

3.7.2 Computer Hardware Career Facts

. 272

3.7.3 Interview: PC Repair Technician (Lesson Video)

. 273

3.7.4 Section Quiz (Section Quiz)

. 273

4.0 Computer Software .....................................................................................................................................................

274

4.1 Chapter Introduction

. 274

4.2 Operating Systems

. 274

4.2.1 Introduction to Operating Systems (Lesson Video)

. 276

4.2.2 OS Interfaces (Lesson Video)

. 277

4.2.3 Operating System Facts

. 277

4.2.4 Windows Settings (Lesson Video)

. 281

4.2.5 Windows Settings Facts

. 282

4.2.6 The Windows Registry

. 283

4.2.7 Explore the Windows 10 OS (Demo Video)

. 284

4.2.8 Explore the Windows 10 OS (Simulation)

. 284

4.2.9 Change Windows Settings (Demo Video)

. 286

4.2.10 Change Windows Settings (Simulation)

. 286

4.2.11 Explore iOS (Demo Video)

. 287

4.2.12 Explore iOS (Simulation)

. 287

4.2.13 Section Quiz (Section Quiz)

. 288

4.3 More System Software

. 299

4.3.1 System Software (Lesson Video)

. 300

4.3.2 System Software Facts

. 301

4.3.3 Update Drivers (Demo Video)

. 302

4.3.4 Update Drivers (Simulation)

. 303

4.3.5 The Boot Process

. 303

4.3.6 BIOS Settings

. 304

4.3.7 Find BIOS Settings (Demo Video)

. 306

4.3.8 Find BIOS Settings (Simulation)

. 307

4.3.9 Clear CMOS Settings (Demo Video)

. 307

4.3.10 Clear CMOS Settings (Simulation)

. 308

4.3.11 Update Firmware (Demo Video)

. 308

4.3.12 Update Firmware (Simulation)

. 309

4.3.13 Virtualization

. 310

4.3.14 Enable VT in the BIOS (Demo Video)

. 312

4.3.15 Enable VT in the BIOS (Simulation)

. 312

4.3.16 Create Virtual Machines (Demo Video)

. 312

4.3.17 Create Virtual Machines (Simulation)

. 313

4.3.18 Section Quiz (Section Quiz)

. 314

4.4 File Management

. 319

4.4.1 Windows File Management (Lesson Video)

. 320

4.4.2 Windows File Management Facts

. 321

4.4.3 Manage Files and Folders (Demo Video)

. 326

4.4.4 Manage Files and Folders (Simulation)

. 327

4.4.5 Assign File Permissions (Demo Video)

. 328

4.4.6 Assign File Permissions (Simulation)

. 328

4.4.7 Copy Files from a USB Thumb Drive (Demo Video)

. 329

4.4.8 Copy Files from a USB Thumb Drive (Simulation)

. 329

4.4.9 NTFS Permissions.............................................................................................................................................................................. 330

4.4.10 Configure NTFS Permissions (Demo Video)

. 332

4.4.11 Configure NTFS Permissions (Simulation)

. 333

4.4.12 Using the Windows Command Line (Lesson Video)

. 334

4.4.13 Use Windows PowerShell Commands (Demo Video)

. 335

4.4.14 Use Windows PowerShell Commands (Simulation)

. 335

4.4.15 Use Linux Shell Commands (Demo Video)

. 337

4.4.16 Use Linux Shell Commands (Simulation)

. 337

4.4.17 Section Quiz (Section Quiz)

. 338

4.5 Application Software

. 344

4.5.1 Productivity Software (Lesson Video)

. 345

4.5.2 Productivity Software

Facts. 346

4.5.3 Collaboration Software (Lesson Video)

. 347

4.5.4 Collaboration Software Facts

. 348

4.5.5 Business Software (Lesson Video)

. 351

4.5.6 Business Software Facts

. 352

4.5.7 App Stores

. 354

4.5.8 Managing Desktop Applications (Lesson Video)

. 356

4.5.9 Desktop Application Facts

. 357

4.5.10 Use Desktop Applications (Demo Video)

. 358

4.5.11 Use Desktop Applications (Simulation)

. 359

4.5.12 Use Microsoft Word (Demo Video)

. 360

4.5.13 Use Microsoft Word (Simulation)

. 360

4.5.14 Use Microsoft PowerPoint (Demo Video)

. 361

4.5.15 Use Microsoft PowerPoint (Simulation)

. 362

4.5.16 Section Quiz (Section Quiz)

. 363

4.6 Printing

..................................................................................................................................................................................................

.. 371

4.6.1 Windows Printing Features (Lesson Video)

. 372

4.6.2 Windows Printing Facts

. 373

4.6.3 3D Printing

. 376

4.6.4 Install and Configure a Local Printer (Demo Video)

. 380

4.6.5 Install and Configure a Local Printer (Simulation)

. 380

4.6.6 Print a Document (Demo Video)

. 381

4.6.7 Print a Document (Simulation)

. 381

4.6.8 Section Quiz (Section Quiz)

. 382

4.7 Software Troubleshooting

. 387

4.7.1 Software Troubleshooting Steps

. 388

4.7.2 Using Task Manager

. 391

4.7.3 Manage Applications (Demo Video)

. 394

4.7.4 Manage Applications (Simulation)

. 394

4.7.5 Repair Programs (Demo Video)

. 395

4.7.6 Repair Programs (Simulation)

. 396

4.7.7 Section Quiz (Section Quiz)

. 396

4.8 System Support Careers

. 402

4.8.1 System Support Careers (Lesson Video)

. 403

4.8.2 System Support Career Facts

. 403

4.8.3 Interview: Technical Support Specialist (Lesson Video)

. 404

4.8.4 Section Quiz (Section Quiz)

. 405

5.0 Internet Technologies 406

5.1 Chapter Introduction

. 406

5.2 The World Wide Web

. 407

5.2.1 The Internet (Lesson Video)

. 408

5.2.2 The Web and Other Internet Technologies (Lesson Video)

. 409

5.2.3 Web and Internet Facts

. 410

5.2.4 Web Applications

. 412

5.2.5 Blogs and Wikis

. 413

5.2.6 RSS Feeds and Podcasts

. 415

5.2.7 Activity: Subscribe to an RSS Feed

. 416

5.2.8 Section Quiz (Section Quiz)

. 416

5.3 Web Browsers

. 421

5.3.1 Using Web Browsers (Lesson Video)

. 423

5.3.2 URLs (Lesson Video)

. 424

5.3.3 Website Navigation Facts

. 425

5.3.4 Configuring Web Browsers (Lesson Video)

. 427

5.3.5 Web Browser Troubleshooting (Lesson Video)

. 428

5.3.6 Web Browser Facts

. 429

5.3.7 Clear Browser Cache (Demo Video)

. 432

5.3.8 Clear Browser Cache (Simulation)

. 432

5.3.9 Configure Browser Settings (Demo Video)

. 433

5.3.10 Configure Browser Settings (Simulation)

. 433

5.3.11 Proxy Servers

. 434

5.3.12 Use a Proxy Server (Demo Video)

. 436

5.3.13 Use a Proxy Server (Simulation)

. 436

5.3.14 Section Quiz (Section Quiz)

. 436

5.4 Cloud Computing

. 446

5.4.1 Cloud Computing (Lesson Video)

. 447

5.4.2 Cloud Computing Facts

. 449

5.4.3 Software as a Service

. 450

5.4.4 Cloud Computing Business Solutions

. 451

5.4.5 Windows Cloud Storage (Lesson Video)

. 453

5.4.6 Windows Cloud Storage Facts

. 454

5.4.7 Copy Files to OneDrive (Demo Video)

. 456

5.4.8 Copy Files to OneDrive (Simulation)

. 456

5.4.9 Section Quiz (Section Quiz)

. 457

5.5 Social Media

. 462

5.5.1 Social Media (Lesson Video)

. 463

5.5.2 Social Media Facts

. 464

5.5.3 Facebook, Twitter, and Instagram

. 465

5.5.4 Online Profiles and Identities

. 466

5.5.5 Crowdsourcing

. 468

5.5.6 Social Media Marketing

. 471

5.5.7 Activity: Set up a Social Media Profile

5.5.8 Section Quiz (Section Quiz)

. 475

5.6 Internet Communications Technologies

. 479

5.6.1 Synchronous vs. Asynchronous Communication

. 480

5.6.2 Email Etiquette (Lesson Video)

. 482

5.6.3 Email Etiquette Facts

. 483

5.6.4 Email Etiquette in Microsoft Outlook (Demo Video)

. 485

5.6.5 Email Etiquette in Microsoft Outlook (Simulation)

. 485

5.6.6 Texting, Messaging, and Online Chat

. 486

5.6.7 Voice over IP

. 487

5.6.8 Online Streaming (Lesson Video)

. 488

5.6.9 Online Streaming Facts

. 488

5.6.10 Section Quiz (Section Quiz)

. 489

5.7 The Internet of Things

. 493

5.7.1 The Internet of Things (Lesson Video)

. 493

5.7.2 Internet of Things Facts

. 494

5.7.3 Digital Assistants

. 495

5.7.4 Configure Smart Devices (Demo Video)

. 497

5.7.5 Configure Smart Devices (Simulation)

. 497

5.7.6 Section Quiz (Section Quiz)

. 499

5.8 Online Research

. 504

5.8.1 Online Searches (Lesson Video)

. 505

5.8.2 Online Searching Facts

. 506

5.8.3 Online Academic Research (Lesson Video)

. 507

5.8.4 Online Academic Research Facts

. 508

5.8.5 Avoiding Plagiarism

. 510

5.8.6 Performing Advanced Searches (Lesson Video)

. 512

5.8.7 Activity: Perform Advanced Searches

5.8.8 Section Quiz (Section Quiz)

. 513

5.9 Internet Technology Careers

. 517

5.9.1 Internet Technology Careers (Lesson Video). 518

5.9.2 Internet Technology Career Facts

. 518

5.9.3 Interview: Social Media Marketer (Lesson Video)

. 519

5.9.4 Section Quiz (Section Quiz)

. 519

6.0 Networking ...................................................................................................................................................................

520

6.1 Chapter Introduction

. 520

6.2 Networking Basics

. 520

6.2.1 Introduction to Networking (Lesson Video)

. 524

6.2.2 Basic Networking Facts

. 524

6.2.3 Network Types

. 527

6.2.4 Network Topologies (Lesson Video)

. 530

6.2.5 Device Addresses (Lesson Video)

. 531

6.2.6 Device Address Facts

. 532

6.2.7 Networking Devices and Interfaces (Lesson Video)

. 533

6.2.8 Networking Device and Interface Facts

. 535

6.2.9 Network Servers (Lesson Video)

. 539

6.2.10 Install a Network Adapter (Demo Video)

. 539

6.2.11 Install a Network Adapter (Simulation)

. 540

6.2.12 Section Quiz (Section Quiz)

. 540

6.3 Wired and Wireless Networking

. 558

6.3.1 Network Cables (Lesson Video)

. 560

6.3.2 Ethernet (Lesson Video)

. 562

6.3.3 Set Up an Ethernet Connection (Demo Video)

. 562

6.3.4 Set Up an Ethernet Connection (Simulation)

. 562

6.3.5 Wireless Standards (Lesson Video)

. 563

6.3.6 Wireless Standard Facts

. 564

6.3.7 Use a Wireless Network (Demo Video)

. 566

6.3.8 Use a Wireless Network (Simulation)

. 566

6.3.9 Bluetooth

..............................................................................................................................................................................................

567

6.3.10 Pair Bluetooth Headphones with a Mobile Device (Demo Video)

. 570

6.3.11 Pair Bluetooth Headphones with a Mobile Device (Simulation)

. 570

6.3.12 Configure Network Printing (Demo Video)

. 571

6.3.13 Configure Network Printing (Simulation)

. 571

6.3.14 Create a Home Wireless Network (Demo Video)

. 572

6.3.15 Create a Home Wireless Network (Simulation)

. 572

6.3.16 Section Quiz (Section Quiz)

. 573

6.4 Internet Connectivity

. 582

6.4.1 Internet Service Types (Lesson Video)

. 583

6.4.2 Internet Service Facts

. 584

6.4.3 Connect a Cable Modem (Demo Video)

. 586

6.4.4 Connect a Cable Modem (Simulation)

. 587

6.4.5 Configure a Wireless Infrastructure (Demo Video)

. 588

6.4.6 Configure a Wireless Infrastructure (Simulation)

. 588

6.4.7 Cellular Technology............................................................................................................................................................................ 589

6.4.8 Manage Mobile Devices (Demo Video)

. 591

6.4.9 Manage Mobile Devices (Simulation)

. 591

6.4.10 Virtual Private Networks

. 592

6.4.11 Configure a VPN Connection (Demo Video)

. 593

6.4.12 Configure a VPN Connection (Simulation)

. 593

6.4.13 Section Quiz (Section Quiz)

. 594

6.5 Networking Protocols

. 601

6.5.1 Internet Protocols (Lesson Video)

. 603

6.5.2 Email Protocols (Lesson Video)

. 604

6.5.3 Internet Protocol Facts

. 604

6.5.4 HTTP Methods and Status Codes

. 608

6.5.5 DHCP

..................................................................................................................................................................................................

. 608

6.5.6 Subnetting (Lesson Video)

. 609

6.5.7 Explore Network Configuration Information (Demo Video)

. 610

6.5.8 Explore Network Configuration Information (Simulation). 610

6.5.9 Configure TCP/IP Settings (Demo Video)

. 611

6.5.10 Configure TCP/IP Settings (Simulation)

. 611

6.5.11 Section Quiz (Section Quiz)

. 612

6.6 Application Delivery

. 618

6.6.1 Application Delivery Methods (Lesson Video)

. 619

6.6.2 Application Delivery Facts

. 620

6.6.3 Application Architecture Models (Lesson Video)

. 622

6.6.4 Application Architecture Facts

. 622

6.6.5 Platforms and Licensing (Lesson Video)

. 623

6.6.6 Platform and Licensing Facts

. 625

6.6.7 Software Installation Best Practices (Lesson Video)

. 627

6.6.8 Software Installation Facts

. 628

6.6.9 Windows Update (Lesson Video)

. 631

6.6.10 Windows Update Facts

. 631

6.6.11 Configure Windows Update (Demo Video)

. 633

6.6.12 Configure Windows Update (Simulation)

. 633

6.6.13 Section Quiz (Section Quiz)

. 634

6.7 Network Troubleshooting

. 649

6.7.1 Network Troubleshooting Tools (Lesson Video)

. 649

6.7.2 Fix Network Adapter Problems (Demo Video)

. 650

6.7.3 Fix Network Adapter Problems (Simulation). 650

6.7.4 Fix a Network Connection 1 (Demo Video)

. 651

6.7.5 Fix a Network Connection 1 (Simulation)

. 651

6.7.6 Fix a Network Connection 2 (Demo Video)

. 652

6.7.7 Fix a Network Connection 2 (Simulation)

. 653

6.7.8 Section Quiz (Section Quiz)

. 654

6.8 Networking Careers

. 654

6.8.1 Careers in Networking (Lesson Video)

. 654

6.8.2 Networking Career Facts

. 655

6.8.3 Interview: Network Administrator (Lesson Video)

. 656

6.8.4 Section Quiz (Section Quiz)

. 657

7.0 Databases 660

7.1 Chapter Introduction

. 660

7.2 Introduction to Databases

. 660

7.2.1 What is a Database? (Lesson Video)

. 661

7.2.2 Data Modeling

. 662

7.2.3 Analytical vs. Operational Data

. 665

7.2.4 Database Management Systems (Lesson Video)

. 667

7.2.5 Database Management System Facts

. 667

7.2.6 Explore an Access Database (Demo Video)

. 668

7.2.7 Explore an Access Database (Simulation)

. 669

7.2.8 Section Quiz (Section Quiz)

. 669

7.3 Relational Databases

. 680

7.3.1 Relational Databases (Lesson Video)

. 681

7.3.2 Relational Database Facts

. 682

7.3.3 Spreadsheets vs. Databases (Lesson Video)

. 684

7.3.4 Database Structure (Lesson Video)

. 685

7.3.5 Types of Relationships

. 685

7.3.6 Relational Methods (Lesson Video)

. 686

7.3.7 Normalization (Lesson Video)

. 687

7.3.8 Database Design in Microsoft Access (Demo Video)

. 688

7.3.9 Database Design in Microsoft Access (Simulation)

. 688

7.3.10 Tables and Relationships (Demo Video)

. 689

7.3.11 Tables and Relationships (Simulation)

. 689

7.3.12 Section Quiz (Section Quiz)

. 690

7.4 Querying Databases

. 698

7.4.1 Database Access Methods (Lesson Video)

. 699

7.4.2 Database Access Facts

. 700

7.4.3 Introduction to Queries (Lesson Video)

. 700

7.4.4 Microsoft Access Queries (Demo Video)

. 701

7.4.5 Microsoft Access Queries (Simulation)

. 701

7.4.6 Create Queries for a School Database (Demo Video)

. 702

7.4.7 Create Queries for a School Database (Simulation)

. 702

7.4.8 SQL (Lesson Video)

. 703

7.4.9 Basic SQL Commands

. 703

7.4.10 Writing SQL Commands (Demo Video)

. 706

7.4.11 SQL: Select All Records in a Table (Simulation)

. 707

7.4.12 SQL: Select Records with a Single Condition (Simulation)

. 707

7.4.13 SQL: Select Records with Multiple Conditions (Simulation)

. 707

7.4.14 SQL: Add a New Record to a Table (Simulation)

. 708

7.4.15 SQL: Delete a Record from a Table (Simulation)

. 708

7.4.16 Section Quiz (Section Quiz)

. 709

7.5 Non-relational Databases

. 722

7.5.1 Non-relational Databases (Lesson Video)

. 722

7.5.2 Non-relational Database Facts

. 723

7.5.3 Non-relational Database Challenges

. 724

7.5.4 Big Data (Lesson Video)

. 724

7.5.5 Big Data Facts

. 725

7.5.6 Section Quiz (Section Quiz)

. 726

7.6 Database Careers

. 733

7.6.1 Careers with Databases (Lesson Video)

. 733

7.6.2 Database Career Facts

. 734

7.6.3 Interview: Data Analyst (Lesson Video)

. 735

7.6.4 Section Quiz (Section Quiz)

. 736

8.0 Programming ...............................................................................................................................................................

739

8.1 Chapter Introduction

. 739

8.2 Programming Overview

. 739

8.2.1 Introduction to Programming (Lesson Video)

. 741

8.2.2 Programming Terminology

. 742

8.2.3 Programming Languages (Lesson Video)

. 743

8.2.4 Programming Language Facts

. 744

8.2.5 History of Programming Languages

. 746

8.2.6 Working with Pseudocode

. 749

8.2.7 Section Quiz (Section Quiz)

. 749

8.3 Programming Fundamentals

. 768

8.3.1 Fundamental Data Types (Lesson Video)

. 769

8.3.2 Variables and Arrays (Lesson Video)

. 770

8.3.3 Programming Logic (Lesson Video)

. 771

8.3.4 Programming Logic Facts

. 771

8.3.5 Functions (Lesson Video)

. 774

8.3.6 Using the JavaScript Code Visualizer (Demo Video)

. 775

8.3.7 JS Code Visualizer: If. Else Statement (Simulation)

. 775

8.3.8 JS Code Visualizer: For Loop (Simulation)

. 775

8.3.9 JS Code Visualizer: For Loop with Array (Simulation)

. 776

8.3.10 JS Code Visualizer: While Loop (Simulation). 776

8.3.11 JS Code Visualizer: Function (Simulation)

. 777

8.3.12 Writing JavaScript Code (Demo Video)

. 777

8.3.13 JavaScript: Create an If. Else Statement (Simulation)

. 778

8.3.14 JavaScript: Create a While Loop (Simulation)

. 778

8.3.15 JavaScript: Create a For Loop (Simulation)

. 778

8.3.16 JavaScript: Loop Through an Array (Simulation)

. 779

8.3.17 JavaScript: Define and Call a Function (Simulation)

. 779

8.3.18 Section Quiz (Section Quiz)

. 779

8.4 Programming Paradigms and Processes

. 792

8.4.1 Programming Paradigms

. 793

8.4.2 Object-Oriented Programming (Lesson Video)

. 794

8.4.3 Version Control (Lesson Video)

. 794

8.4.4 Integrated Development Environments

. 795

8.4.5 Application Programming Interfaces

. 797

8.4.6 Activity: Basic Python Scripting

. 797

8.4.7 Activity: Basic JavaScript

. 799

8.4.8 Section Quiz (Section Quiz)

. 800

8.5 Web Development

. 804

8.5.1 Web Programming Overview (Lesson Video)

. 805

8.5.2 HTML, CSS, and JavaScript (Lesson Video)

. 806

8.5.3 HTML, CSS, and JavaScript Facts

. 807

8.5.4 HTML Tags

. 808

8.5.5 Writing Simple HTML (Demo Video)

. 809

8.5.6 HTML: Define a Webpage's Head and Body (Simulation)

. 809

8.5.7 HTML: Add Headings to a Webpage (Simulation)

. 809

8.5.8 HTML: Create Ordered and Unordered Lists (Simulation)

. 810

8.5.9 HTML: Add Images and Hyperlinks (Simulation)

. 810

8.5.10 HTML: Link a CSS File to an HTML Page (Simulation)

. 811

8.5.11 Writing Simple CSS (Demo Video)

. 811

8.5.12 CSS: Resize an Image (Simulation)

. 812

8.5.13 CSS: Change a Page's Fonts (Simulation)

. 812

8.5.14 CSS: Add a Drop Shadow to an Element (Simulation)

. 813

8.5.15 JavaScript: Make a Webpage Interactive (Simulation)

. 813

8.5.16 Section Quiz (Section Quiz)

. 814

8.6 Programming Careers

. 817

8.6.1 Careers in Programming (Lesson Video)

. 817

8.6.2 Programming Career Facts

. 818

8.6.3 Interview: Application Developer (Lesson Video)

. 819

8.6.4 Section Quiz (Section Quiz)

. 819

9.0 Information Systems 823

9.1 Chapter Introduction

. 823

9.2 Introduction to Business Systems

. 823

9.2.1 Introduction to Information Systems (Lesson Video)

. 824

9.2.2 Types of Information Systems (Lesson Video)

. 825

9.2.3 Information System Facts

. 826

9.2.4 Artificial Intelligence (Lesson Video)

. 828

9.2.5 Artificial Intelligence Facts

. 828

9.2.6 Supply Chain Management

. 829

9.2.7 Customer Relationship Management

. 832

9.2.8 Cryptocurrency

. 833

9.2.9 Section Quiz (Section Quiz)

. 835

9.3 Data Analysis

. 839

9.3.1 Data and Information Assets (Lesson Video)

. 840

9.3.2 Data and Information Facts

. 841

9.3.3 Microsoft Excel Chart Types (Lesson Video)

. 843

9.3.4 Use Microsoft Excel Tables to Analyze Data (Demo Video)

. 843

9.3.5 Use Microsoft Excel Tables to Analyze Data (Simulation)

. 844

9.3.6 Use Microsoft Excel Charts to Analyze Data (Demo Video)

. 845

9.3.7 Use Microsoft Excel Charts to Analyze Data (Simulation)

. 845

9.3.8 Use Microsoft Access Reports to Analyze Data (Demo Video)

. 846

9.3.9 Use Microsoft Access Reports to Analyze Data (Simulation)

. 846

9.3.10 Section Quiz (Section Quiz)

. 847

9.4 Designing and Implementing Systems

. 854

9.4.1 Systems Analysis and Design (Lesson Video). 855

9.4.2 Systems Analysis Facts

. 856

9.4.3 Project Management Facts

. 858

9.4.4 Agile Methodology

. 859

9.4.5 Section Quiz (Section Quiz)

. 861

9.5 Intellectual Property

. 865

9.5.1 Copyright and Intellectual Property (Lesson Video)

. 866

9.5.2 Patents and Trademarks (Lesson Video)

. 867

9.5.3 Intellectual Property Facts

. 868

9.5.4 Creative Commons

. 870

9.5.5 Digital Millennium Copyright Act

. 871

9.5.6 Section Quiz (Section Quiz)

. 872

9.6 Information System

Careers. 879

9.6.1 Information Systems Careers (Lesson Video)

. 880

9.6.2 Information Systems Career Facts

. 880

9.6.3 Interview: Project Manager (Lesson Video)

. 881

9.6.4 Section Quiz (Section Quiz)

. 882

10.0 Cybersecurity ............................................................................................................................................................

883

10.1 Chapter Introduction

. 883

10.2 Security Threats

. 883

10.2.1 Confidentiality Concerns (Lesson Video)

. 885

10.2.2 Confidentiality Facts

. 886

10.2.3 Integrity Concerns (Lesson Video)

. 890

10.2.4 Integrity Facts

. 890

10.2.5 Availability Concerns (Lesson Video)

. 891

10.2.6 Availability Facts

. 892

10.2.7 Digital Privacy (Lesson Video)

. 894

10.2.8 Digital Privacy Facts

. 894

10.2.9 Malware Types (Lesson Video)

. 896

10.2.10 Password Attacks

. 898

10.2.11 Identity Theft

. 900

10.2.12 Recognize Social Engineering Exploits 1 (Demo Video)

. 902

10.2.13 Recognize Social Engineering Exploits 1 (Simulation)

. 903

10.2.14 Recognize Social Engineering Exploits 2 (Demo Video)

. 904

10.2.15 Recognize Social Engineering Exploits 2 (Simulation)

. 905

10.2.16 Activity: Research Privacy Issues

. 906

10.2.17 Section Quiz (Section Quiz)

. 907

10.3 Authentication

. 927

10.3.1 Authentication (Lesson Video)

. 928

10.3.2 Authentication Facts

. 929

10.3.3 Authorization (Lesson Video)

. 930

10.3.4 Authorization Facts

. 931

10.3.5 Accounting (Lesson Video)

. 932

10.3.6 Accounting Facts

. 933

10.3.7 Create a User Account (Demo Video)

. 933

10.3.8 Create a User Account (Simulation)

. 934

10.3.9 Configure iPad Access Control and Authentication (Demo Video)

. 935

10.3.10 Configure iPad Access Control and Authentication (Simulation)

. 935

10.3.11 Activity: Research Information Security

. 936

10.3.12 Section Quiz (Section Quiz)

. 936

10.4 Data Encryption

. 947

10.4.1 Encryption (Lesson Video)

. 948

10.4.2 Encryption Facts

. 949

10.4.3 Asymmetric Encryption (Lesson Video)

. 949

10.4.4 Certificates (Lesson Video)

. 949

10.4.5 Configure File Encryption (Demo Video)

. 950

10.4.6 Configure File Encryption (Simulation)

. 950

10.4.7 Secure a Home Wireless Network (Demo Video)

. 951

10.4.8 Secure a Home Wireless Network (Simulation)

. 951

10.4.9 Section Quiz (Section Quiz)

. 953

10.5 Device Security

. 961

10.5.1 Password Best Practices (Lesson Video)

. 962

10.5.2 Password Facts

. 964

10.5.3 Enforce Password Settings (Demo Video)

. 967

10.5.4 Enforce Password Settings (Simulation)

. 967

10.5.5 Securing Devices (Lesson Video)

. 968

10.5.6 Device Security Facts

. 970

10.5.7 Configure Remote Wipe (Demo Video)

. 972

10.5.8 Configure Remote Wipe (Simulation)

. 973

10.5.9 Ecommerce Safeguards (Lesson Video)

. 973

10.5.10 Ecommerce Facts

. 975

10.5.11 Windows Defender (Lesson Video)

. 976

10.5.12 Windows Defender Facts

. 977

10.5.13 Use Windows Defender (Demo Video)

. 978

10.5.14 Use Windows Defender (Simulation)

. 978

10.5.15 Windows Firewall (Lesson Video). 979

10.5.16 Windows Firewall

Facts. 981

10.5.17 Configure Windows Firewall (Demo Video)

. 983

10.5.18 Configure Windows Firewall (Simulation)

. 983

10.5.19 Section Quiz (Section Quiz)

. 984

10.6 Business Continuity Plans

. 1001

10.6.1 Handling Confidential Information (Lesson Video)

. 1003

10.6.2 Confidential Information Facts

. 1004

10.6.3 Fault Tolerance (Lesson Video)

. 1006

10.6.4 Fault Tolerance Facts

. 1007

10.6.5 Install a UPS (Demo Video)

. 1008

10.6.6 Install a UPS (Simulation)

. 1009

10.6.7 RAID Implementations

. 1010

10.6.8 Create RAID Arrays (Demo Video)

. 1012

10.6.9 Create RAID Arrays (Simulation)

. 1013

10.6.10 Backup Considerations (Lesson Video)

. 1014

10.6.11 Backup Facts

. 1015

10.6.12 Use Backup Software (Demo Video)

. 1017

10.6.13 Use Backup Software (Simulation)

. 1018

10.6.14 Configure File History (Demo Video)

. 1019

10.6.15 Configure File History (Simulation)

. 1019

10.6.16 Restore Data from File History (Demo Video)

. 1019

10.6.17 Restore Data from File History (Simulation)

. 1020

10.6.18 Disaster Recovery (Lesson Video)

. 1021

10.6.19 Disaster Recovery Facts

. 1021

10.6.20 Section Quiz (Section Quiz)

. 1022

10.7 Cybersecurity Careers

. 1034

10.7.1 Careers in Security (Lesson Video)

. 1034

10.7.2 Security Career Facts

. 1035

10.7.3 Interview: Security Analyst (Lesson Video)

. 1036

10.7.4 Section Quiz (Section Quiz)

. 1037

11.0 IT Career Preparation 1040

11.1 Chapter Introduction

. 1040

11.2 Education and Training

. 1040

11.2.1 Choosing an IT Career Path (Lesson Video)

. 1042

11.2.2 Future Trends in IT

. 1043

11.2.3 College Programs

. 1046

11.2.4 IT Certifications

. 1047

11.2.5 Section Quiz (Section Quiz)

. 1048

11.3 Finding a Job

. 1052

11.3.1 Character and Professionalism (Lesson Video)

. 1053

11.3.2 Networking (Lesson Video)

. 1054

11.3.3 Resumes

..........................................................................................................................................................................................

1056

11.3.4 Interviewing Tips: Part I (Lesson Video)

. 1057

11.3.5 Interviewing Tips: Part II (Lesson Video)

. 1058

11.3.6 Section Quiz (Section Quiz)

. 1059

A.0 TestOut IT Fundamentals Pro - Practice Exams 1061

A.1 Prepare for TestOut IT Fundamentals Pro Certification

. 1061

A.1.1 Pro Exam Objectives

. 1062

A.1.2 Pro Objectives by Course Section

. 1065

A.1.3 How to take the Pro Exam

. 1071

A.1.4 Pro Exam FAQs

. 1071

A.2 TestOut IT Fundamentals Pro Question Review

. 1071

A.2.1 Pro Objective 1: Hardware (Section Quiz)

. 1072

A.2.2 Pro Objective 2: Software (Section Quiz)

. 1072

A.2.3 Pro Objective 3: Operating Systems (Section Quiz)

. 1072

A.2.4 Pro Objective 4: Networking (Section Quiz)

. 1072

A.2.5 Pro Objective 5: Databases (Section Quiz)

. 1072

A.2.6 Pro Objective 6: Programming (Section Quiz)

. 1072

A.2.7 Pro Objective 7: IT Systems and Security (Section Quiz)

. 1072

A.3 TestOut IT Fundamentals Pro Certification Practice Exam (Section Quiz)

. 1072

B.0 CompTIA IT Fundamentals (FC0-U61) - Practice Exams 1073

B.1 Prepare for CompTIA IT Fundamentals FC0-U61 Certification

. 1073

B.1.1 FC0-U61 Exam Objectives

. 1074

B.1.2 FC0-U61 Exam Objectives by Course Section

. 1084

B.1.3 How to take the FC0-U61 Exam

. 1107

B.1.4 FC0-U61 Exam FAQs

. 1107

B.1.5 Hints and Tips for taking the FC0-U61 Exam

. 1109

B.2 CompTIA IT Fundamentals FC0-U61 Domain Review (20 Questions)

. 1111

B.2.1 FC0-U61 Domain 1: Concepts and Terminology (Section Quiz)

. 1111

B.2.2 FC0-U61 Domain 2: Infrastructure (Section Quiz)

. 1111

B.2.3 FC0-U61 Domain 3: Applications and Software (Section Quiz)

. 1111

B.2.4 FC0-U61 Domain 4: Software Development (Section Quiz)

. 1111

B.2.5 FC0-U61 Domain 5: Database Fundamentals (Section Quiz)

. 1111

B.2.6 FC0-U61 Domain 6: Security (Section Quiz)

. 1112

B.3 CompTIA IT Fundamentals FC0-U61 Domain Review (All Questions)

. 1112

B.3.1 FC0-U61 Domain 1: Concepts and Terminology (Section Quiz)

. 1112

B.3.2 FC0-U61 Domain 2: Infrastructure (Section Quiz)

. 1112

B.3.3 FC0-U61 Domain 3: Applications and Software (Section Quiz)

. 1112

B.3.4 FC0-U61 Domain 4: Software Development (Section Quiz)

. 1112

B.3.5 FC0-U61 Domain 5: Database Fundamentals (Section Quiz)

. 1113

B.3.6 FC0-U61 Domain 6: Security (Section Quiz)

. 1113

B.4 CompTIA IT Fundamentals FC0-U61 Certification Practice Exam (Section Quiz)

. 1113


1.0 Course Overview

1.1 Chapter Introduction


A group of diverse individuals looking out into a futuristic city using different forms of technology. Illustration. Course Overview

The TestOut IT Fundamentals Pro course was designed for students who are interested in Information Technology but have limited technical knowledge of computing systems. We'll explore foundational concepts related to computer hardware and software, networking, databases, programming, Information Systems, and data security. The course includes over 100 hands-on labs to reinforce important concepts. As you perform real-world tasks associated with various IT fields, you'll gain a broad understanding of career options that will help you refine your interests and make vocational choices. The course also covers all objectives necessary to pass the TestOut IT Fundamentals Pro and CompTIA IT Fundamentals (FC0-U61) certification exams. There are eleven chapters in the course.

• Chapter 1: COURSE OVERVIEW


• Chapter 2: INFORMATION TECHNOLOGY BASICS


• Chapter 3: COMPUTER HARDWARE


• Chapter 4: COMPUTER SOFTWARE


• Chapter 5: INTERNET TECHNOLOGIES


• Chapter 6: NETWORKING


• Chapter 7: DATABASES


• Chapter 8: PROGRAMMING


• Chapter 9: INFORMATION SYSTEMS


• Chapter 10: CYBERSECURITY


• Chapter 11: IT CAREER PREPARATION

This first chapter begins by defining three overlapping disciplines: Information Technology (IT), Information Systems (IS), and Computer Science (CS). After an in-depth discussion of the learning objectives for the course, the chapter continues with a survey of ethical issues associated with computer technology. As you explore technology concepts throughout the course, it's important to revisit the ethical principles covered in this first chapter.

After finishing this chapter, you should be able to:

• Define Information Technology, Information Systems, and Computer Science.


• Describe the scope of the TestOut IT Fundamentals Pro objectives.


• Identify and discuss important ethical issues associated with computer technology.


1.2 What Is Information Technology? Section Introduction

As you study this section, keep the following questions in mind:

• How will understanding IT help me achieve my goals in life?


• What do I already know about computers? What do I wish I knew?


• How have advances in technology impacted my own life?


This section defines three overlapping disciplines: Information Technology, Information Systems, and Computer Science. It then provides a detailed overview of the entire course. After finishing this section, you should be able to:

• Recall key moments in the history of information technology.


• Define Information Technology, Information Systems, and Computer Science.


• Describe why "systems thinking" is important in designing information systems.


• Describe the main objectives of the course.


• Identify new concepts and skills that you will master after completing this course.


• Explain how this course will help you achieve your career goals.


• Conduct online research on a career that interests you in information technology.


Key terms for this section include the following:

Term Definition


Information Technology

A discipline that is dedicated to meeting the computer needs of businesses, schools, governments, and other organizations.


Information Systems

A discipline that involves collecting and utilizing data to help organizations know what information they need, how to generate it, and how to turn it into meaningful decisions.


Computer Science

The study of computers and computing concepts. In practice, computer science deals with creating software and using


1.2.1 IT, IS, and CS (Lesson Video) Transcript:

Welcome to TestOut IT Fundamentals Pro! Chances are you've been a computer user for several years. Most people today have experience using computers and smart devices for email, social media, video streaming, and gaming – in other words, most people are already computer consumers. In this course, you'll learn to start thinking like a computer professional.

IT Fundamentals Pro is a survey course. Instead of studying a single subject in depth, we will cover a wide variety of topics from three broad disciplines – Information technology, information systems, and computer science. These three areas build on and support each other – they aren't discrete categories.

Information technology, or IT, has two meanings. As a general term, it refers to everything that involves computers – that's why this course is called IT Fundamentals. As a specific discipline, it refers to meeting the computer needs of businesses, schools, governments, and other organizations. A generation ago, most office workers didn't have a computer at their workstation. Today, most workers can't do their job without a computer. IT professionals build and repair computers, create and maintain networks, and help people with their technology needs.

Information Systems, or IS, has to do with collecting and utilizing data. It's impossible for an organization to be successful without information. Companies need to know what to make and how to sell it, governments need to keep track of their constituents, and schools need to manage grades and enrollments. IS professionals help organizations know what information they need, how to generate it, and how to turn that information into meaningful decisions.

Computer science is the study of computers and computing concepts. In practice, computer science deals with software. Many computer scientists design, create, and improve software – this is also called software engineering. Computer scientists also devise new ways to use computers to solve problems in areas like robotics, forensics, numerical analysis, and artificial intelligence.

This course is designed for anyone who wants to learn more about computers, even if you don't want to work in a tech- related field. That said, if you find part of the course to be particularly interesting, it may be worth exploring as a career option. The last section of each chapter will focus on career exploration, including an informational interview with a professional from a relevant field. Computer technology jobs are typically among the most rewarding, secure, and highest paying careers.

1.2.2 Course Overview

The TestOut IT Fundamentals Pro course was designed for students who are interested in Information Technology but have limited technical knowledge of computing systems. Students learn foundational concepts related to computer hardware and software, networking, databases, programming, Information Systems, and data security. In addition to instructional videos and textual content, the course includes over 100 hands-on labs to reinforce the concepts students are learning. The course also introduces students to a wide range of IT careers. It covers all objectives necessary to pass the TestOut IT Fundamentals Pro exam as well as the CompTIA IT Fundamentals (FC0-U61) exam.

The course is divided into eleven main chapters. Table 1: Overview of Chapters

Chapter Overview


1. Course Overview

This chapter begins by defining three overlapping disciplines: Information Technology, Information Systems, and Computer Science. After an in-depth discussion of the learning objectives for the course, the chapter continues with a survey of ethical issues associated with computer technology. As students explore technology concepts throughout the course, it's important to revisit the ethical principles covered in this first chapter.

After finishing this chapter, students should be able to:

• Define Information Technology, Information Systems, and Computer Science.


• Describe the scope of the TestOut IT Fundamentals Pro objectives.


2. Information Technology Basics

This chapter introduces the basic components of a computer system and provides a brief history of computer technology. It then describes how computers translate physical signals into digital information. The chapter concludes with a brief look at common careers in digital media.

After finishing this chapter, students should be able to:


Chapter Overview


• Describe the basic components of a computer system.


• Recall significant developments in the history of computer technology.


• Explain how computers store and interpret digital information.


• Identify common careers in digital media.


3. Computer Hardware

This chapter describes the purpose of computer hardware, including internal components such as the processor, memory, motherboard, input and output devices, and storage. Using hardware simulators, students practice installing and troubleshooting various system components. The chapter concludes with a brief look at common careers in computer hardware.

After finishing this chapter, students should be able to:

• Compare and contrast the features of various computing devices.


• Identify, install, and troubleshoot internal hardware components.


• Identify, install, and troubleshoot input and output devices.


• Identify, install, and troubleshoot storage devices.


• Identify common careers in computer hardware.


4. Computer Software

This chapter discusses the purpose and features of computer software. Students learn the difference between system and application software, how computer software interacts with hardware, and how to troubleshoot common software problems. Simulated labs give students practice configuring operating systems, viewing BIOS settings, managing files, and using Microsoft Office applications. The chapter concludes with a brief look at common careers in system support. After finishing this chapter, students should be able to:

• Identify and describe the basic functions of computer operating systems.


• Explain the purpose of other types of system software, such as the BIOS, device drivers, and utility software.

• Perform file management tasks on both Windows and Linux.


• Configure, use, and troubleshoot application software.


• Configure software applications to send files to a printer.


• Identify common careers in system support.


5. Internet Technologies

This chapter describes internet technologies such as the world wide web, email, cloud computing, social media, and the Internet of Things (IoT). It explains the importance of protecting online identities, practicing proper email etiquette, and avoiding plagiarism when conducting online research. Students practice configuring web browsers, copying files to the cloud, responding to email messages, and configuring smart devices. The chapter concludes with a brief look at common careers in designing and configuring internet technologies.

After finishing this chapter, students should be able to:

• Describe the essential components of the web, including websites, URLs, hyperlinks, web browsers, and search engines.


• Configure privacy and security settings in web browsers.


• Identify common uses of cloud computing.


• Recognize the risks and responsibilities of using social media.


Chapter Overview


• Describe various internet communication technologies, including email, streaming media, online chat, and voice over IP (VoIP).


• Identify and configure IoT devices.


• Conduct online research ethically and efficiently.


• Identify common careers in designing and configuring internet technologies.


6. Networking

This chapter introduces concepts and best practices associated with computer networking. It describes devices, standards, and protocols used in both wired and wireless networking. Students practice installing and configuring network devices, setting up secure internet connections, and troubleshooting network connection problems. The chapter concludes with a brief look at common computer networking careers.

After finishing this chapter, students should be able to:

• Describe standard networking devices, interfaces, and protocols.


• Install, configure, and troubleshoot networking hardware and software.

• Configure computer devices to connect to both wired and wireless networks.


• Configure a wireless infrastructure for internet connectivity.


• Configure a virtual private network (VPN).


• Describe how software applications can be delivered to users over a network.


• Identify common careers in computer networking.


7. Databases

This chapter describes the purposes and functionality of database systems. It introduces database design techniques, data access methods, and the challenges and opportunities associated with Big Data. Students practice configuring database objects, writing SQL commands, and designing tables within a database management system. The chapter concludes with a brief look at common careers associated with database systems.

After finishing this chapter, students should be able to:

• Describe the advantages of using databases to store and access data.


• Describe the purpose of a database management system.


• Use Microsoft Access to modify tables, forms, queries, and reports.


• Describe the basic principles of relational database design.


• Write simple SQL commands to retrieve and modify data.


• Identify the challenges and opportunities associated with Big Data.


• Identify common careers in working with databases.


8. Programming

This chapter provides a basic overview of computer programming. It introduces programming languages, logic, and development paradigms. Students use JavaScript to define variables, arrays, and functions; execute simple looping and branching logic; and add functionality to a web page. In addition to simple JavaScript programming, students use HTML and CSS to format web page content. The chapter concludes with a brief look at common careers in computer programming.

After finishing this chapter, students should be able to:

• Compare and contrast different types of programming languages and paradigms.


• Analyze and interpret programming logic.


• Use JavaScript to define variables, arrays, and functions.


• Use JavaScript to execute simple branching and looping logic.


• Describe common tools and best practices used in software development.


• Use HTML and CSS to format simple web pages.

Chapter Overview


• Describe how HTML, CSS, and JavaScript work together to create dynamic web content.


• Identify common careers in computer programming.


9. Information Systems

This chapter describes the role of Information Systems in business. It introduces the importance of data analytics, business intelligence, systems analysis and design, project management, and protecting intellectual property. Students use Microsoft Excel and Access to perform simple data analysis. The chapter concludes with a brief look at common careers in Information Systems.

After finishing this chapter, students should be able to:

• Describe the various components of an information system.


• Describe the importance of Information Systems in transaction processing, supply chain management, and customer relationship management.


• Explain how businesses use data analytics to make more informed decisions.


• Use Microsoft Excel and Access to perform simple data analysis.


• Describe the importance of project management in the design and implementation of Information Systems.


• Describe how businesses protect their intellectual property.


• Identify common careers in Information Systems.


10. Cybersecurity

This chapter introduces various strategies and tools for responding to data security threats. It describes how system administrators use authentication, data encryption, device security, and business continuity plans to protect valuable information. Students practice recognizing social engineering exploits, configuring access control, encrypting files, configuring device security, and implementing fault tolerance. The chapter concludes with a brief look at common careers in cybersecurity.

After finishing this chapter, students should be able to:

• Describe common threats to data confidentiality, data integrity, and data availability.


• Evaluate email messages to determine if they represent possible social engineering attacks.


• Describe common access control frameworks.


• Configure account access on various computing devices.


• Encrypt files on a computer.


• Configure antimalware and firewalls to protect computer systems.

• Implement fault tolerance and disaster recovery for different types of data.


• Identify common careers in cybersecurity.


11. IT Career Preparation

This chapter summarizes various career paths in Information Technology. It discusses future trends in IT and explores how college programs and certifications help students prepare for IT careers. The chapter concludes with helpful tips on finding and preparing for IT jobs.

After finishing this chapter, students should be able to:

• Describe the most common career paths in Information Technology.


• Identify and discuss future IT career trends.


• Identify college programs and certifications that are designed to help students prepare for IT careers.


Chapter Overview


• Discuss the importance of character development, job search networking, elevator pitches, professional resumes, and preparing for interview questions.


The opinions expressed in career spotlight videos are those of individual IT professionals and do not necessarily represent or reflect the views of TestOut Corporation.

1.2.3 Course Objectives

This course teaches foundational concepts and skills in Information Technology (IT). It provides a broad survey of IT career pathways and gives students practice performing real-world tasks associated with various careers. The course also prepares students to take the TestOut IT Fundamentals Pro Exam and the CompTIA IT Fundamentals Exam (FC0-U61). Chapter 1: Course Overview

Course Section Objectives


1.2 What Is Information Technology?

• Recall key moments in the history of information technology.


• Define Information Technology, Information Systems, and Computer Science.


• Describe why "systems thinking" is important in designing information systems.


• Describe the main objectives of the course.


• Identify new concepts and skills that you will master after completing this course.

• Explain how this course will help you achieve your career goals.


• Conduct online research on a career that interests you in information technology.


1.3 Technology and Ethics

• Describe ethical considerations related to evolving forms of technology, including artificial intelligence, workplace automation, personal privacy, and green computing.


• Identify health and productivity issues related to technology, including ergonomics, blue light exposure, cyberloafing, and employee monitoring.


• Distinguish between the legal and ethical aspects of issues such as security breaches, criminal use of data encryption, and the dark web.


• Discuss the arguments for and against net neutrality.


Chapter 2: Information Technology Basics Course Section

Objectives


2.2 Introduction to Computers

• Recall significant developments in the history of modern computing.


• Identify uses of computers in today's world.


• Identify the basic functions of computers.


• Describe various roles for today’s supercomputers.


• Describe the basic principles of human-computer interaction.


2.3 Digital Data

• Describe the binary number system used by computers to process data.


• Describe how binary numbers can be translated into hexadecimal form.


• Define bits and bytes.


• Explain how physical signals are translated into digital information.


Course Section

Objectives


• Describe the most common character encoding standards, including ASCII and Unicode.


• Describe the most common units of measurement used for storage, throughput, and processing speed.


2.4 Media Formatting

• Describe how audio and video are stored digitally.


• Distinguish between raster and vector images.


• Select the best format for digital images.


• Describe how RGB values determine pixel color.


• Compare common image file types.


• Describe the most common digital audio and video file formats.


• Describe how 3D modeling is used for computer graphics.


• Describe the difference between lossless and lossy compression algorithms.


• Discuss how sampling rate and bit depth impact the quality of digital audio.


• Discuss how file compression and image resolution impact the quality of digital images.


2.5 Digital Media Careers

• Describe common careers in digital media, including video production, graphic design, and digital audio production.


• Identify skills and educational requirements for digital media careers.


Chapter 3: Computer Hardware Course Section

Objectives


3.2 Computing Devices

• Compare and contrast the features of various computing devices, including cost, screen size, computing power, portability, storage capacity, cases and form factors, and digital cameras.


• Recommend computing devices based on user requirements.

3.3 Internal Components

• Describe the most common internal components of a typical computer system, including processor, RAM, motherboard, power supply, GPU, NIC, and cooling system.


• Distinguish between the two main types of consumer-level CPUs.


• Describe how computer processors execute instructions.


• Follow guidelines to reduce electrostatic discharge when working with computers.


• Identify various types of expansion slots on a motherboard.


• Install a single memory module on the motherboard.


• Disconnect a monitor from the video card and remove the card from the computer.


• Install a video card with an HDMI connection and connect the PCIe power connector to the video card.


• Connect a computer to a monitor using an HDMI cable.


• Configure a monitor’s display resolution for full HD content.


3.4 Input and Output

• Identify common peripheral devices by sight.


• Identify common ports and connectors by sight.


• Connect cables and peripherals to a computer system.


Course Section Objectives


• Select appropriate cables and hardware devices for particular scenarios.


• Troubleshoot common problems when installing external devices to a computer system.


• Identify the proper cable to connect a computer to an Ethernet port.


• Set up a desktop computer system, including peripherals, power cables, and networking cable.


• Describe how touchscreens are used as input devices.


• Choose the most appropriate printer for different scenarios.


• Describe how a camera works.

3.5 Storage

• Compare and contrast the features of different external storage devices, including hard disk drives, optical drives, flash storage, and solid state drives.


• Describe common file system features, including compression, encryption, permissions, journaling, and file naming rules.


• Compare and contrast common file systems, such as NTFS, FAT32, HFS, and Ext4.


• Describe disk partitioning and formatting methods.


• Describe disk maintenance procedures, including defragmentation, repair, and cleanup.


• Describe emerging storage technologies.


• Install SATA hard drives in a computer. o Connect drives to the motherboard. o Plug in the power connector from the power supply.


• Install an eSATA port connector to a computer by connecting the cable to an available motherboard port.


• Boot a computer into the BIOS and verify that newly installed hard drives are detected.


• Initialize new disks using the MBR partition style.


• Create a volume on a disk with a specific volume size, drive letter, file system, and volume label.


• Format a flash drive with the FAT32 file system.


• Convert a drive to use NTFS instead of FAT32 without destroying any existing data on the disk.


• Run Disk Cleanup on a local hard drive.


• Configure disk defragmentation to run on a schedule.


3.6 Hardware Troubleshooting

• Identify the proper sequence of steps to follow in the troubleshooting methodology.


• Diagnose and resolve common motherboard problems.


• Diagnose and resolve common computer memory problems.


• Diagnose and resolve common processor problems.


• Diagnose and resolve common disk storage problems.


• Diagnose and resolve common computer display problems.

3.7 Computer Hardware Careers

• Describe common careers in computer hardware, ranging from PC repair technician to electrical engineer.


• Identify skills and educational requirements for computer hardware careers.


Chapter 4: Computer Software Course Section

Objectives


4.2 Operating Systems

• Identify common operating systems, including systems designed for mobile devices.


• Describe the basic functions of different types of operating systems.


• Identify and describe components of the Windows 10 operating system.


• Change display settings in Windows.


• Use the Settings app to view system information.


• Configure a screen saver through the Settings app.


• Describe the purpose of the configuration settings stored in the Windows registry.


• Use iOS on a mobile device to check email account settings, Wi-Fi settings, Bluetooth settings, and the iOS version.


4.3 More System Software

• Identify and describe different types of system software.


• Explain the purpose of a computer’s BIOS and other firmware.


• Recognize and use utility software.


• Use Windows Device Manager to update drivers.


• Explain how virtualization can be used to extend the capabilities of computer systems.


• Describe each step in the Windows boot sequence.


• Enter the BIOS setup program on your computer.


• Use BIOS settings to identify processor brand, installed memory, BIOS version number, number of hard drives, and NIC status.


• Run an executable program to update the BIOS.

• Clear CMOS settings on the motherboard.


• Create a virtual machine with the following settings. o Startup memory


o Network connection


o Virtual hard disk


o Minimum and maximum RAM


4.4 File Management

• Compare and contrast the features of various file systems.


• Create folders in the Windows file system.


• Copy, rename, and delete files in Windows.


• Share a Windows folder with users and grant them specific access to files within the folder.


• Use the Windows Recycle Bin.


• Manage files using both a command line and a graphical user interface.


• Explain how NTFS and share permissions work together to control access to Windows files and folders.


• Add and remove users from access control lists.


• Assign specific folder permissions to user groups.


• Use the following Windows PowerShell commands. o Change directories.


o View files and folders.


o Make a directory.


o Copy files to other folders.


o Stop a process.


o Map a drive to a shared folder.


• Use the Linux command line to add, copy, rename, modify, and delete files.


• Insert a USB thumb drive into a USB port and verify that the system detects the device.

Course Section Objectives


• Copy a file from a thumb drive to a folder on your hard drive.


• Safely remove a thumb drive from a Windows system.


4.5 Application Software

• Identify application software that increases personal productivity.


• Identify application software that facilitates collaboration.


• Identify some common business application software.


• Run Windows applications.


• Pin applications to the Start menu and the taskbar.


• Unpin applications from the Start menu and the taskbar.


• Create application shortcuts on the Windows desktop.


• Explain how app stores are used to distribute application software.


• Open, modify, and save a Microsoft Word document.


• Open, modify, and run a Microsoft PowerPoint slide show.


4.6 Printing

• Open and print a document from Microsoft Word.


• Describe Windows printing features.


• Plug in and connect a printer to a computer.


• Connect to a shared printer.


• Configure the default printer.


• Share a local printer with other users on a network.


• Describe how 3D printing works.


4.7 Software Troubleshooting

• Identify common steps to follow in troubleshooting software problems.


• Configure compatibility settings for Windows applications.


• Use Windows Task Manager to: o View information on running processes.


o Prevent applications from running at system startup.


o Close unresponsive apps.


• Repair a Windows program in Apps & features.


4.8 System Support Careers

• Describe common careers in system support.


• Identify skills and educational requirements for system support careers.


Chapter 5: Internet Technologies Course Section

Objectives


5.2 The World Wide Web

• Define the internet and the world wide web.


• Describe the essential components of the web, including websites, URLs, hyperlinks, web browsers, and search engines.


• Identify and describe technologies that use the internet, including the web, email, instant messaging, VoIP, and the Internet of Things.


• Compare and contrast desktop applications with web applications.


• Describe the role of online collaboration tools such as blogs, wikis, RSS feeds, and podcasts.


5.3 Web Browsers

• Use a web browser to access the world wide web.


• Identify each of the component parts of a URL.

Course Section Objectives


• Use browser features such as private browsing, bookmarks, and downloading files.


• Describe key browser and website features, including plug-ins, client-side scripting, certificates, caching, and proxy settings.


• Configure browser privacy and security features such as pop-up blockers, location tracking, and cookies.


• Clear a browser's cache.


• Troubleshoot common browser problems.


• Configure proxy server settings on a computer to control internet access.


5.4 Cloud Computing

• Define and describe the uses of cloud computing.


• Copy files from the local Windows file system to OneDrive.


• Explain the relationship between cloud computing and Software as a Service (SaaS).


• Discuss the features of cloud computing business solutions, including Microsoft Azure, Google Cloud, and Amazon Web Services.


5.5 Social Media

• Identify common web applications, including Webmail, Google Docs, Facebook, and YouTube.


• Define social media and describe its uses.


• Compare and contrast the uses of common social media platforms, including Facebook, Twitter, and Instagram.


• Recognize the risks and responsibilities of using social media.


• Explain why it is important to manage and protect your online identity.


• Create an effective social media profile.


• Describe the basics of social media marketing and crowdsourcing.


5.6 Internet Communications Technologies

• Describe the differences between downloading, live streaming, and on-demand streaming.


• Distinguish between synchronous and asynchronous communication.


• Describe safeguards to follow when using email.

• Display proper email etiquette by using Reply, Reply All, Cc, and Bcc appropriately.


• Explain the differences between texting, messaging, and online chat.


• Explain the communication technology that allows Voice over IP calls.


5.7 The Internet of Things

• Define the Internet of Things.


• Identify some of the most common devices that make up the Internet of Things.


• Use a home security app to install and configure smart devices such as cameras, light switches, locks, thermostats, and outlets.


• Describe the features of digital assistants such as Siri, Cortana, and Google Assistant.


5.8 Online Research

• Use a search engine to find and evaluate web content. o Use Advanced Search forms. o Use search operators to refine searches.


• Identify reliable academic sources online.


Course Section Objectives


• Distinguish between primary, secondary, and tertiary sources.


• Explain how to avoid plagiarism when using online sources.


5.9 Internet Technology Careers

• Describe common careers in designing and configuring internet technologies, including web design, social media marketing, and internet service support.


• Identify skills and educational requirements for internet technology careers.

Chapter 6: Networking Course Section Objectives


6.2 Networking Basics

• Define some advantages of computer networking.


• Explain the difference between a local area network (LAN) and a wide area network (WAN).


• Describe common network topologies, including bus, ring, star, and mesh.


• Explain the role of clients and servers on a network.


• Describe standard devices and interfaces used in wired networking.


• Describe standard devices and interfaces used in wireless networking.


• Describe different network storage options.


• Select and install a network interface card.


• Use an appropriate network cable to connect a computer to the local network.


• Use Network & Internet settings in Windows to confirm that a workstation is connected to the local network and the internet.


6.3 Wired and Wireless Networking

• Describe the most common networking cable types, including twisted pair, coaxial, and fiber optic cables.


• Use an Ethernet cable to connect a workstation to a local area network.


• Compare and contrast wireless networking standards, including IEEE 802.11 and Bluetooth.


• Connect to a public Wi-Fi network.


• Connect to a secure wireless network.


• Describe best practices in installing and configuring a wireless network.


• Describe the most common ways to set up printing over a network.


• Install a wireless access point, including the appropriate cable connections.


• Configure a laptop to connect to a wireless network.


• Share a printer with other users on a local network.


• Add a shared printer to the list of available printers on another workstation.


• Pair Bluetooth speakers with a mobile device. o Discover available Bluetooth devices.

o Connect a mobile device to Bluetooth speakers.


6.4 Internet Connectivity

• Describe the relationship between ISPs and the internet.


• Compare and contrast different internet service options.


• Use a cable modem to connect a small home office network to the internet.


Course Section Objectives


• Explain how successive generations of cellular technologies impact mobile internet speed.


• Describe how to use a virtual private network (VPN) to create a secure connection over the internet.


• Configure a wireless infrastructure for internet connectivity. o Install a cable modem to a WAN connection.


o Install a wireless router.


o Connect the internet port on a router to a cable modem.


o Connect a computer to a LAN port on a wireless router.


• Configure an iPad to use SSL to securely communicate with an email server.


• Connect an iPad to a secure wireless network.


• Configure a VPN connection on a laptop computer with the following settings. o VPN Server address


o Secure Socket Tunneling Protocol


o Secure password-based authentication protocol


• Connect a laptop to a VPN.

6.5 Networking Protocols

• Describe basic internet protocols, including TCP/IP, UDP, DNS, HTTP, FTP, and DHCP.


• Describe common email protocols, including SMTP, POP3, and IMAP.


• Identify common HTTP methods, such as GET, POST, and DELETE.


• Interpret common HTTP status codes.


• Describe how networking devices transmit data to the right location on a network.


• Use the ipconfig command to find the following information for a workstation: o IPv4 address


o Subnet mask


o Default gateway address


o DNS server address


o DHCP server address


• Configure the following IP version 4 TCP/IP settings for a workstation to connect to the local network and the internet:

o IP Address


o Subnet Mask


o Default Gateway


o DNS Server


6.6 Application Delivery

• Compare and contrast different methods of delivering applications to users.


• Describe various ways software applications can be designed for greater scalability and maintenance.


• Compare and contrast different software licensing models.


• Use various methods to install and use software applications.


• Install software patches and updates.


• Configure a Windows system for automatic updates.


6.7 Network Troubleshooting

• Diagnose and fix network connection problems such as: o Unplugged network cable


o Incorrect TCP/IP settings


o Faulty network cable


o Network adapter problems


Course Section Objectives


6.8 Networking Careers

• Describe various careers in computer networking, including network administrator, network architect, and network technician.


• Identify skills and educational requirements for computer networking careers.


Chapter 7: Databases Course Section Objectives


7.2 Introduction to Databases

• Describe the advantages of using a database rather than a flat file to store information.


• Describe the role of data modeling in database design.


• Compare and contrast operational data with analytical data.


• Describe the purpose of a database management system.


• Use Microsoft Access to explore database objects.


7.3 Relational Databases

• Describe the purposes of a relational database.


• Define basic relational database terminology, including fields, records, primary keys, foreign keys, and one-to-many relationships.

• Define the terms normalization and serialization as they relate to storing and retrieving data.


• Answer basic questions about Microsoft Access table relationships.


• Perform the following database design tasks in Microsoft Access: o Create a table.


o Add fields to a table.


o Change the data type and size of a field.


o Set default field values.


o Create table relationships.


7.4 Querying Databases

• Compare and contrast different methods of accessing data from a database.


• Describe the purpose of basic SQL commands.


• Interpret simple SQL queries.


• Answer basic questions about existing Microsoft Access queries.


• Use Microsoft Access to perform basic queries on a database.


• Write SQL commands to do the following: o Retrieve all data from a particular table.


o Retrieve table data that matches certain criteria.


o Add a new record to an existing table.


o Delete a record from a table.


7.5 Non-relational Databases

• Describe the basic functions and types of non-relational databases.


• Define the term Big Data and describe its related challenges and opportunities.


7.6 Database Careers

• Describe various careers in working with databases, including database administrator, database developer, and data analyst.

Course Section Objectives


• Identify skills and educational requirements for databases careers.


Chapter 8: Programming Course Section Objectives


8.2 Programming Overview

• Recall significant developments in the history of computer programming.


• Explain what computer programming is and why it is useful.


• Describe the difference between programming and scripting.


• Analyze and interpret pseudocode and programming logic flowcharts.


• Describe the difference between developing computer programs and using software packages.


• Compare and contrast different programming language categories, including interpreted, compiled, and query languages.


8.3 Programming Fundamentals

• Compare and contrast fundamental data types used in computer programming.


• Describe the purpose of programming constructs such as variables, arrays, and functions.


• Describe the purpose of programming logic, including branching and looping.


• Place lines of pseudocode in the proper order to achieve desired functionality.


• Use JavaScript to do the following: o Create, initialize, change, and then display the value of a variable.


o Use an if…else statement to execute lines of code when certain conditions are true.


o Use a for loop to execute a block of code a certain number of times.


o Use a while loop to continue executing a block of code while certain conditions are true.


o Create and initialize the elements of an array.


o Display a specific array element based on an index.

o Use a for loop to evaluate each element of an array.


o Define and call a simple function.


8.4 Programming Paradigms and Processes

• Describe common programming paradigms, including declarative and procedural methods.


• Explain the advantages of object-oriented programming.


• Explain the basic principles of object-oriented programming, including encapsulation, inheritance, and polymorphism.


• Describe the role of an integrated development environment (IDE) and application programming interfaces (APIs) in building software applications.


• Explain how the following are used to manage, maintain, and deliver high quality software solutions: o Agile methods


o Version control


o Coding standards


o Testing standards


Course Section Objectives


8.5 Web Development

• Identify and understand the purposes of HTML, CSS, and JavaScript in a web browser.


• Define frontend, backend, and full-stack development.


• Write HTML code to do the following: o Use <head> and <body> tags to create a web page.


o Use <div> tags to divide a web page into sections.


o Use <h> tags for web page headings.


o Use <p> tags for web page paragraphs.


o Use <a> tags for hyperlinks.

o Use <ul>, <ol>, and <li> tags to create bulleted and numbered lists.


o Use <img> tags to insert images into a web page.


o Add a caption to an image.


o Link to an external CSS style sheet.


• Write CSS style sheets to do the following: o Resize an image to match the size of its <div> wrapper.


o Center a line of text.


o Italicize text within a <span> tag.


o Specify a particular font family for all text on a page.


o Change the font color of headings.


o Add padding to a page element.


o Add a drop-shadow to an element.


o Modify the background color of an element.


• Use JavaScript to add functionality to a button on a web page.


8.6 Programming Careers

• Describe several careers in computer science, including application developer, web programmer, and QA engineer.


• Identify skills and educational requirements for computer science careers.


Chapter 9: Information Systems Course Section

Objectives


9.2 Introduction to Business Systems

• Describe the components of an information system and how they fit together.


• Compare and contrast different types of information systems, including transaction processing, management information systems, and expert systems.

• Describe the role of artificial intelligence in modern information systems.


• Explain how information systems can facilitate effective supply chain management.


• Identify the various systems that need to be integrated for customer relationship management.


• Describe how Bitcoin and other forms of cryptocurrency use distributed computing systems for financial transactions.


9.3 Data Analysis

• Describe the importance of data-driven business decisions.


• Describe the relationship between data and information assets.


• Identify the basic steps in the data analytics process.


Course Section Objectives


• Use Microsoft Excel tables and charts to analyze data. o Format cells as a table with total rows.


o Sort table columns to better interpret data.


o Use Excel charts to display aggregate data.


o Modify Excel chart settings to better interpret data.


• Analyze data using Microsoft Access reports. o Open an Access report based on a sales query.


o Interpret Access reports.


9.4 Designing and Implementing Systems

• Identify the traditional stages of the System Development Life Cycle (SDLC).


• Describe modern alternatives to a linear process of systems analysis and design.


• Describe the role of project management in the design and implementation of information systems.


• Identify the core principles of Agile methodology in project management.

9.5 Intellectual Property

• Describe the implications of copyright and intellectual property laws for internet use.


• Explain how Creative Commons licenses can make it easier for content creators to share their work.


• Explain how the Digital Millennium Copyright Act (DMCA) can potentially protect both copyright owners and ISPs.


9.6 Information System Careers

• Describe common careers in information systems, including project manager, systems analyst, and information systems manager.


• Identify skills and educational requirements for information systems careers.


Chapter 10: Cybersecurity Course Section Objectives


10.2 Security Threats

• Explain how much privacy you can expect when using the internet for social networking, file sharing, and financial transactions.


• Explain how much privacy you can expect when using computers at work.


• Describe the most common threats to data confidentiality.


• Describe the most common threats to data integrity.


• Describe the most common threats to data availability.


• Identify common social engineering techniques used by hackers to gain access to online data.


• Evaluate email messages to determine if they represent a possible social engineering attack.


• Identify the most common types of malware, including viruses, worms, Trojan horses, ransomware, and spyware.


• Identify specific types of password attacks, including dictionary attacks and brute-force cracking.


• Explain how to protect yourself against identity theft.


Course Section Objectives

10.3 Authentication

• Explain the importance of the authentication, authorization, and accounting framework.


• Describe the most common authentication types and when to use them.


• Explain the purpose of multifactor authentication.


• Describe various models for creating and maintaining access control lists.


• Explain why access control frameworks need to keep track of who gains access to the system.


• Set a secure passcode on an iPad.


• Configure an iPad to erase data after 10 failed passcode attempts.


• Create a local Windows account for a user who already has a Microsoft login.


• Create a non-Microsoft user account on a Windows system.


10.4 Data Encryption

• Describe the basics of data encryption, including encryption algorithms, certificates, and public and private key pairs.


• Explain how encryption can be used in both data transmission and storage.


• Use a web browser to secure a wireless network. o Change the SSID name.


o Use WPA2-PSK authentication with AES for encryption.


o Configure a secure pass phrase.


o Change the username and password for the wireless access point administrator login.


• Encrypt a folder on your computer.


• Add authorized users to an encrypted folder.


10.5 Device Security

• Describe the most important safeguards in protecting yourself from internet security risks.


• Describe best practices for using secure passwords.


• Describe how to avoid or protect yourself against different types of malware.


• Safely spend money on the internet.


• Configure Windows Defender to protect your home computer from malware.

• Configure Windows Firewall for different networks.


• Configure a remote wipe of a mobile device. o Use a web browser to login to icloud.com, find an iPad, and erase all data.


o Enter a phone number and message to be displayed on a missing iPad.


• Use the Local Security Policy tool in Windows to configure password restrictions: o Password length


o Password complexity


o Password reuse


o Password history


10.6 Business Continuity Plans

• Compare and contrast classification schemes for handling confidential information.


• Define data, network, and power redundancy and explain how they contribute to fault tolerance.


• Explain why it's important to back up data files.


• Describe backup procedures for different types of data.


• Explain the purpose of business continuity plans.


Course Section Objectives


• Describe the common components of a disaster recovery plan.


• Configure Windows backup settings.


• Describe the advantages and disadvantages of various RAID levels.


• Add a UPS to a workstation and monitor.


• Connect and plug in the appropriate cables needed for a UPS.


• Use Windows Disk Management to create and format volumes for RAID arrays. o Create both striped (RAID0) and mirrored volumes (RAID1).

o Format volumes using NTFS.


• Enable File History on a volume.


• Configure File History to regularly save copies of files and to save file versions for a certain period of time.


• Use File History to restore previous versions of files.


10.7 Cybersecurity Careers

• Describe common careers in IT security, including systems administrator, computer forensics expert, and security analyst.


• Identify skills and educational requirements for IT security careers.


Chapter 11: IT Career Preparation Course Section

Objectives


11.2 Education and Training

• Describe various career paths in information technology.


• Identify and discuss future trends in information technology jobs, including hyper automation, predictive healthcare, edge computing, extended reality, the distributed cloud, blockchain technology, and the Internet of Things.


• Identify college programs that help students prepare for IT careers.


• Recognize the importance of certifications in IT fields such as networking, databases, cybersecurity, and project management.


11.3 Finding a Job

• Discuss character traits needed for success in IT careers, including integrity, resourcefulness, and social skills.


• Recognize the importance of job search networking.


• Prepare a resume that effectively highlights your skills and experience.


• Craft a short, persuasive "elevator pitch" that describes who you are and the type of job you're seeking.


• Prepare for and respond effectively to a wide range of job interview questions.

1.2.4 Activity: Career Exploration

In this activity, you will learn more about an information systems career that interests you. Do the following:

1. Select an information systems or information technology career that most interests you. Possibilities include network administrator, programmer, security analyst, and data scientist.


2. Conduct online research to answer the following questions regarding this career. o What are the typical job responsibilities?


o What are the required skills, experience, and education?


o What IT certifications are available in this field?


o What is the salary range for an entry-level position?


o What aspects of this job do IS or IT professionals find the most rewarding?


o What are the most challenging day-to-day responsibilities of this job?


3. Write a one-page summary of your research.


1.2.5 Section Quiz (Section Quiz) q_itf2_courseoverview_01

Which of the following BEST describes Information Technology (IT)? Answers:

• *IT refers to everything that involves computers.


• IT has to do with collecting and utilizing data.


• IT deals with how to turn information into meaningful decisions.


• IT refers to designing, creating, and improving software.


Explanation:

Information Technology (IT) as a general term refers to everything that involves computers.

Information Systems (IS) has to do with collecting and utilizing data. It deals with how to turn that information into meaningful decisions.

Computer scientists are those who design, create, and improve software. q_itf2_courseoverview_02

Which of the following is something that an Information Technology (IT) professional would do? Answers:

• *Build and repair computers


• Manage grades and enrollments


• Create and improve software

• Collect and utilize data


Explanation:

IT professionals build and repair computers.

Information Systems (IS) has to do with collecting and utilizing data. For example, a school would use IS to manage grades and enrollments.

Computer scientists are those who design, create, and improve software. q_itf2_courseoverview_03

Which of the following is something that an Information Systems (IS) professional would do? Answers:

• Create and maintain computer networks


• *Turn information into meaningful decisions


• Help people with their technology needs


• Devise new ways to use computers


Explanation:

IS professionals help organizations know what information they need, how to generate it, and how to turn that information into meaningful decisions.

IT professionals build and repair computers, create and maintain networks, and help people with their technology needs. Computer scientists devise new ways to use computers.

q_itf2_courseoverview_04

Which of the following BEST describes Computer Science (CS)? Answers:

• *It is the study of computers and computing concepts.


• It has to do with collecting and utilizing data.


• It refers to everything that involves computers.


• It refers to meeting the technological needs of businesses.


Explanation:

Computer Science (CS) is the study of computers and computing concepts.

Information Technology (IT) has two meanings. It refers to everything that involves computers and also to meeting the technological needs of businesses, schools, governments, and other organizations.

Information Systems (IS) has to do with collecting and utilizing data. q_itf2_courseoverview_05

Which of the following is something a computer scientist would do? Answers:

• Create and maintain computer networks


• Help organizations know how to generate information


• *Solve problems in areas like robotics


• Help people with their technological needs

Explanation:

Computer scientists devise new ways to use computers in order to solve problems in areas like robotics, forensics, numerical analysis, and Artificial Intelligence (AI).

IT professionals build and repair computers, create and maintain networks, and help people with their technological needs.

IS professionals help organizations know what information they need, how to generate it, and how to turn that information into meaningful decisions.

1.3 Technology and Ethics Section Introduction

As you study this section, keep the following questions in mind:

• Why is it important for me to live by a code of ethics?


• How have I seen technology used for good? How have I seen it misused?


• To what degree should governments use technology to monitor their citizens?


This section introduces various ethical issues associated with computer technology. After finishing this section, you should be able to:

• Describe ethical considerations related to evolving forms of technology, including artificial intelligence, workplace automation, personal privacy, and green computing.


• Identify health and productivity issues related to technology, including ergonomics, blue light exposure, cyberloafing, and employee monitoring.


• Distinguish between the legal and ethical aspects of issues such as security breaches, criminal use of data encryption, and the dark web.


• Discuss the arguments for and against net neutrality.


Key terms for this section include the following:

Term Definition


Ethics

Personal behaviors that build responsibility and trust. Computer ethics requires more than just avoiding unlawful acts but also upholding standards such as confidentiality, human dignity, civility, and property rights.


Artificial Intelligence

An area of computer science that focuses on intelligent machines.


Intellectual Property

Content that is owned by a copyright holder.


Dark Web

A network of encrypted content that allows users to engage in untraceable activity.


Green Computing

Environmentally sound policies that prescribe energy efficiency, recycling, and eco-friendly disposal of electronic equipment.


Ergonomics

The study of how people function most effectively in their work environment.


Blue Light

A range of the visible light spectrum, typically used to refer to light emitted from electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision problems.


Cyberloafing

Employees using their company's internet connection for personal use on company time.


Employee Monitoring

Observing and recording the activities of employees, sometimes without their direct consent.


Net Neutrality

A government policy that required Internet Service Providers to allow equal access to all web content.


Predictive Policing

Law enforcement practice that involves analyzing data from traffic cameras, surveillance footage, and social media postings for the purpose of preventing crimes before they are actually committed.


Hacktivism

Malicious attacks on networks and websites for the purpose of promoting social change, regarded by some as civil disobedience and others as cyberterrorism.


Doxing

Publishing the private contact information of one's political opponents online.


1.3.1 Technology and Ethics (Lesson Video) Transcript:

Computer technology is empowering. It gives us access to information and tools that can have a positive impact on our lives. However, technology can also be used to harm other people. This is where ethics comes into play. Because computer technology expands human agency in letting us do things that we couldn't otherwise do, we need to embrace ethical principles and responsibilities in using it.

Before we talk about specific ethical principles, let's look at some examples of unethical behavior that relate to technology.

Example one: A college student decides to humiliate a former friend by posting embarrassing photos on social media. Example two: An IT specialist violates the privacy of a fellow employee by viewing her confidential personnel files. Example three: An engineering team endangers the lives of hospital patients by releasing a software product before it's been thoroughly tested. The team is rewarded with a performance bonus for meeting their product release deadline.

Example four: A high school student hacks into her school's academic records database and changes the grades of fellow classmates.

Example five: The IT staff at a hospital shares genetic information about specific patients with a life insurance company. In addition to being unethical, some of these actions are also illegal and can have serious consequences both for the victims and the perpetrators. But whether or not specific laws have been passed to discourage unethical actions, it's still our responsibility to treat other people with dignity and respect. Computer ethics require you to do more than simply avoid unlawful acts. They describe personal behaviors that show responsibility and trust, even when no one is watching. Here are some basic ethical principles that apply to a wide range of scenarios.

The principle of confidentiality means that we protect data and information we're not authorized to share.

The principle of human dignity means respecting and honoring the inherent worth and right to privacy of other people. The principle of civility means observing rules of "netiquette" that promote courtesy and respect in online settings.

The principle of digital property rights means recognizing and respecting the intellectual property of others, including

online data, login information, creative works, and other digital assets.

Information technology professionals often develop a code of ethics for themselves and their organizations. Even if you don't become an IT professional, you'll be required to make moral decisions in a variety of situations. Developing a personal code of ethics can help you to identify values, principles, and rules of behavior to keep you, your family, and your colleagues safe.

For example, your personal code of ethics might include statements such as:

1. I will not violate the digital property rights of those I encounter online.

2. I will honor the privacy of others by keeping their data and information secure.

3. In communicating with others online, I will promote courtesy, respect, and understanding.

Living safely and ethically in the digital world requires both knowledge and personal responsibility. As you become more familiar with the power of computer technology, you should also maintain a firm commitment to principles of ethical behavior.

1.3.2 Technology and Ethics Facts

Computer technology is empowering. It gives us access to data, information, and tools that have a positive impact on our lives. However, computer technology can also be used to harm other people. Here are some examples:

1. A college student decides to humiliate a former friend by posting embarrassing photos on a social media site.


2. An information technology specialist violates the privacy of a fellow employee by viewing her confidential personnel files.


3. An engineering team endangers the lives of hospital patients by releasing a software product before it has been thoroughly tested. The team is rewarded with a performance bonus for meeting the original release deadline.


4. A high school student hacks into her school's academic records database and changes the grades of fellow classmates.


5. The information technology staff at a hospital shares genetic information about specific patients with a life insurance company.


Ethics are personal behaviors that build responsibility and trust. Computer ethics requires you to do more than simply avoid unlawful acts. It upholds ethical standards such as:

• Confidentiality : protecting confidential data and information.


• Human Dignity : respecting the privacy and dignity of other human beings.


• Civility : observing rules of "netiquette" that promote online civility.


• Property Rights : refusing to violate the intellectual property rights of others.


A code of ethics is a set of rules or standards you adopt that dictate how you act. As you work with computers, you will be required to make moral decisions in a variety of situations with many degrees of complexity. Therefore, your code of ethics cannot prescribe actions for every possible situation. Instead, it should identify general principles of proper behavior that can be applied to many situations. Your code of ethics may include the elements described in the following table:

Table 1: Personal Code of Ethics ETHIC

DESCRIPTION


Values

Values provide the basis for your code of ethics. They identify the beliefs and ideals that guide your actions as you work with computers and interact with others.

Principles

Principles are the fundamental truths or rules that support your personal values. Principles should be focused on honesty, integrity, and respect for others.


Personal Responsibility

Personal responsibility reinforces your adherence to your values and principles. In essence, defining a personal responsibility dictates how you will act even if no one is watching.


Legal Compliance

Legal compliance involves obeying laws that regulate how computers are used. For example, installing key-logger software on your instructor's computer to obtain her password is a violation of the law, which could subject you to prosecution. Some laws and regulations may require you to report unlawful acts that you see others commit.


For example, the (ISC) 2 organization of computer security professionals has developed the following code of ethics for its members to adhere to:

• Protect society, the commonwealth, and the infrastructure.


• Act honorably, honestly, justly, responsibly, and legally.


• Provide diligent and competent service to principals.


• Advance and protect the profession.


1.3.3 Survey of Relevant Ethical Issues


A teacher instructing robot students on ethical principles. Illustration.

As computer technology evolves, new questions arise regarding ethics, health and productivity, and legal issues. This lesson provides an overview of a number of current areas of concern.

Artificial Intelligence

For many years, science fiction has suggested the possibility of machines achieving a level of superintelligence that surpasses our own. In this imagined future, intelligent robots threaten the freedom and ultimate survival of the human race. While scientists disagree on whether such a "technological singularity" is even possible, real-life advances in Artificial Intelligence (AI) have already forced us to confront a number of ethical issues.

For example, should we regulate the use of AI in online systems that manipulate and deceive people? These systems often collect and use personal information to sell products, promote addiction, and spread political propaganda.

Society at large is quickly embracing the use of robotics in health care, transportation, and workplace automation. Should we be concerned about these technological developments? For example, can robots that are designed to care for aging patients unintentionally become a threat to human dignity? While self-driving cars can reduce the number of traffic accidents, are they sufficiently programmed to deal with complex and risky driving scenarios? As AI and robotics are increasingly used to automate manufacturing processes, can the labor market provide better jobs for displaced workers?

Intellectual Property

Digital information and electronic media have transformed the way we look at intellectual property rights. Because software applications are so easy to copy and distribute, piracy is a constant concern for companies that sell software. This is a particular concern when businesses operate in countries with less restrictive copyright laws.

The music and film industries face tremendous challenges in preventing electronic media from being shared without permission. These industries have been forced to adapt their business models to limit piracy and protect their intellectual property rights.

Personal Privacy

Most of us are aware that our personal information can be collected, analyzed, and even sold for profit online. Search

engines like Google collect and store our browsing history, language preferences, and device information in vast online databases. Social media platforms like Facebook collect demographic information, personal contacts, and opinions, all of which can be used by advertisers to target audiences who are most likely to purchase their products. Government institutions store information about our current residences, family relationships, tax and employment records, and property ownership. Healthcare organizations track our confidential medical histories and genetic information.

Most organizations that collect data try to be transparent in publishing their privacy policies that are meant to protect their customers' online identities. However, many people still have legitimate concerns about companies that profit from personal data without receiving explicit permission. With so much personal information available, it's easy to see how organizations could be enticed to violate basic privacy rights. Furthermore, database systems are frequent targets of cybercriminals who seek to steal data for malicious purposes.

Data Security

Businesses and other organizations that store personal information have the ethical responsibility to do everything in their power to keep the data secure. Hackers are constantly searching for system vulnerabilities that allow them to steal credit card numbers, email addresses, and confidential business information.

As technology professionals invent more sophisticated tools and techniques for securing data, criminals make use of these same technologies for their own purposes. For example, organized crime and drug trafficking operations use device security and data encryption to hide their transactions from law enforcement. The dark web is an example of a network of encrypted content that allows users to engage in untraceable activity. To combat these activities, law enforcement officials frequently press technology companies for "backdoor" access to encrypted data. Such requests may seem reasonable, but they can also result in unintended security flaws.

Green Computing

Our increasing reliance on computer technology brings up questions about environmental sustainability. How much responsibility should technology companies and individuals accept when it comes to protecting the environment? Should governments mandate particular levels of energy-efficiency in computing devices? How can individuals become more aware of the importance of using, recycling, and disposing of electronic equipment in an eco-friendly manner?

Health and Productivity

While computers have transformed the workplace in many positive ways, they can also negatively impact the health and productivity of employees. Business managers can reduce potential health problems by providing ergonomically sound workspaces, giving employees the option of using a standing desk, and creating work policies that reduce distraction.

Individuals who spend the majority of their working hours looking at a computer screen need to be aware of the effects of blue light emitted from electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision problems.

As businesses seek to maximize productivity, they need to consider the ethical implications of monitoring the activities of employees without their knowledge. The term "cyberloafing" refers to employees who use their company's internet connection for personal use on company time. This is one reason many companies make use of employee-monitoring software. It's important, however, to attempt to balance employee productivity with respect for personal privacy rights. Net Neutrality

From 2010 to 2018, the Federal Communications Commission of the United States (FCC) advocated a policy of net neutrality. This policy essentially required Internet Service Providers (ISPs) to allow equal access to all web content. ISPs were not allowed to block specific websites, throttle the speed of particular web services, or give preferential treatment to websites or services who were willing to pay a higher premium for faster access.

In 2018, the FCC reversed their policy on net neutrality, arguing that the government should not be in the business of regulating high-speed internet services. People who support this decision suggest that less regulation will inevitably lead to greater innovation, better overall access speeds, and lower premiums. Net neutrality advocates, however, worry that the internet will no longer be a level playing field if broadband service providers have the power to block or limit access to some sites and services.

Social Justice

Law enforcement agencies take advantage of the vast amount of data available from traffic cameras, surveillance footage, and social media postings. By analyzing this data, they can engage in "predictive policing" to prevent crimes before they're actually committed. Critics argue, however, that using technology in this way leads to more racial profiling and invasive government surveillance.

Social activists who advocate greater government transparency support the idea of making confidential government documents available to the public. WikiLeaks and other organizations argue that society has a right to view top secret documents. However, government officials have legitimate concerns about guarding military secrets and keeping the

details of government negotiations private.

Other social activists engage in what has become known as "hacktivism," which involves malicious attacks on networks and websites for the purpose of promoting social change. While some people justify these types of activities as a form of civil disobedience, others characterize them as cyberterrorism. Some activists also choose to violate the privacy of their opponents by "doxing" them, which means publishing their phone number, address, and other personal information on the internet.

1.3.4 Section Quiz (Section Quiz) q_itf_ethics_01

Mike decides to humiliate a former friend by posting embarrassing photos on social media. Which ethical standard did he violate?

Answers:

• Confidentiality


• *Human dignity


• Civility


• Property rights


Explanation:

The principle of human dignity means respecting and honoring the inherent worth and right to privacy of other people. The principle of confidentiality means that we protect data and information we're not authorized to share.

The principle of civility means observing rules of "netiquette" that promote courtesy and respect in online settings. The principle of digital property rights means recognizing and respecting the intellectual property of others, including online data, login information, creative works, and other digital assets.

q_itf_ethics_02

Which of the following BEST describes personal responsibility? Answers:

• Obeying laws that regulate how computers are used


• *How you act even if no one is watching


• Rules that support your personal values


• Provides the basis for your code of ethics


Explanation:

Personal responsibility dictates how you act even if no one is watching.

Legal compliance involves obeying laws that regulate how computers are used. Principles are the fundamental truths or rules that undergird your personal values. Values provide the basis for your code of ethics.

q_itf_ethics_03

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?

Answers:

• Property rights


• Civility


• Human dignity


• *Confidentiality

Explanation:

The principle of confidentiality means that we protect data and information we're not authorized to share.

The principle of human dignity means respecting and honoring the inherent worth and right to privacy of other people. The principle of confidentiality means that we protect data and information we're not authorized to share.

The principle of civility means observing rules of "netiquette" that promote courtesy and respect in online settings. The principle of digital property rights means recognizing and respecting the intellectual property of others, including online data, login information, creative works, and other digital assets.

q_itf_ethics_04

Which of the following BEST describes a code of ethics? Answers:

• *A set of rules or standards you adopt that dictate how you act


• The fundamental truths or rules that undergird your personal values


• Your personal adherence to your own values and principles


• Ideals that guide your actions as you work with computers


• Laws that regulate how computers are used


Explanation:

A code of ethics is a set of rules or standards you adopt that dictate how you act. Your code of ethics may include the following elements:

• Values: values identify the beliefs and ideals that guide your actions as you work with computers and interact with others.


• Principles: principles are the fundamental truths or rules that undergird your personal values.


• Personal Responsibility: personal responsibility reinforces your personal adherence to your own values and principles.


• Legal Compliance: legal compliance involves obeying laws that regulate how computers are used.


q_itf_ethics_facts_01

Match each ethical principle on the left to its definition on the right. Answers:

• Confidentiality


• Human Dignity


• Civility


• Digital Property Rights


Explanation:

The principle of confidentiality means that we protect data and information we're not authorized to share.

The principle of human dignity means respecting and honoring the inherent worth and right to privacy of other people. The principle of civility means observing rules of "netiquette" that promote courtesy and respect in online settings.

The principle of digital property rights means recognizing and respecting the intellectual property of others, including online data, login information, creative works, and other digital assets.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1.

2.0 Information Technology Basics

2.1 Chapter Introduction


Four scenarios where professionals interact with technology such as robotics, data science, drones, and satellites. Illustration.

Information Technology Basics

This chapter introduces the basic components of a computer system and provides a brief history of computer technology. It then describes how computers translate physical signals into digital information. The chapter concludes with a brief look at common careers in digital media.

After finishing this chapter, you should be able to:

• Describe the basic components of a computer system.


• Recall significant developments in the history of computer technology.


• Explain how computers store and interpret digital information.


• Identify common careers in digital media.


2.2 Introduction to Computers Section Introduction

As you study this section, keep the following questions in mind:

• How are modern computers similar to early computers? How are they different?


• What is the relationship between input, processing, output, and storage?


This section provides a brief history of computers and explains the basic principles of human-computer interaction. After finishing this section, you should be able to:

• Recall significant developments in the history of modern computing.


• Identify uses of computers in today's world.


• Identify the basic functions of computers.


• Describe various roles for today’s supercomputers.


• Describe the basic principles of human-computer interaction.


Key terms for this section include the following:

Term Definition


Input

Information that a user physically enters into a computer by pressing a key on a keyboard, clicking a mouse, tapping a touch screen, pushing a button on a game controller, speaking into a microphone, etc.


Processing

The operations performed by a computer to retrieve, transform, or classify information. Output

Information that a computer returns to a user such as images on a screen, sounds from speakers, and printed pages.


Storage

The saving of information on memory chips, discs, or other storage media by a computer for later use.


Hollerith's Tabulating Machine

An early computing machine that used punched cards and metal pins. It was used to compile the 1890 US census.


Transistor

A smaller, faster, cheaper, and more durable electronic device that replaced mechanical relays, which were slow and tended to wear down over time.


Microchip

An electronic device that allowed entire computers to be built into a single board, replacing modules for each part of the computer. Microchips paved the way for personal computer ownership.


World Wide Web

A system for making digital resources publicly available over the internet using a web browser that paved the way for email, chatrooms, and social media sites.


Smartphone

A mobile phone that functions as a computer and allows users to access the internet.


Supercomputers

The fastest, most powerful computers that exist at a given time. These computers have processing capabilities designed to solve problems that are too complex for regular computers. They play vital roles in the advancement of national defense, science, and social change.


Human-computer Interaction

A field of study that looks at how computers and other kinds of technology interact with humans.


2.2.1 Introduction to Computers (Lesson Video) Transcript:

One of the most remarkable characteristics of humanity is our history of advancing technology. We made tools from stone, then bronze, iron, and steel. We learned to hunt and gather, then to farm and fish. We created towns, then cities, then nations. Each of these developments brought dramatic and irreversible changes to the world. And the most exciting part is, we're still advancing.

Many historians refer to our current historical period as the information age. With the advent of computers, the foundation of our economy has quickly shifted from traditional industry to information technology. Communicating and accessing information has never been easier. There's a good chance that you are carrying an access point to the entirety of human knowledge in your pocket.

We know that computers are important. But what are computers? At their most basic level, computers are systems that take input from a user, process it, then display the results of the computation or store the results to be used later. Let's look at each step of this process.

Before a computer can work, somebody needs to physically put information into it. In computer terms, this is called input. Pressing a key on a keyboard, clicking a mouse, tapping a touch screen, pushing a button on a game controller, and speaking into a microphone are all examples of input.

Each of these input devices sends electrical signals into the computer. By themselves, these signals don't mean much. However, the computer quickly performs calculations on the input, converting the raw electrical signals into data. This is called processing. For example, the computer may process input from a button on a controller into a command to make a

video game character jump.

Once processing is done, there are two things the computer can do with the data. The first is to return information to the user, which is called output. Images on a screen, sounds from speakers, and printed pages are all output. In our video game example, the output consists of the character jumping on the monitor and a sound playing on the speakers. Once the character has jumped to a new platform, the computer writes his new location into its short-term memory.

The other option for processed data is to be remembered for later use. This is called storage. When the player saves her game, the computer records information about the game into its long-term storage. This lets the player turn her game off, then pick up where she left off when she comes back.

Talking about this process step by step may make it seem slow. However, modern computers can execute millions of instructions every second.

Computers can do amazing things. It almost seems incredible that if I touch this piece of glass in just the right way, a pizza will show up at my house. However, simple or complex, all computing is based on the same four steps: input, processing, output, and storage.

2.2.2 Computer System Facts

This lesson covers the topic of computer functions. Computer Functions

At their most basic level, computers are systems that take input from a user, process it, then display the results of the computation or store the results to be used later. The following table describes each of these functions.

Table 1: Basic Computer System Functions Term

Description


Input

Computer Keyboard Computer Mouse

Before a computer can work, it must have information. Input is the act of physically putting data into a computer. Input devices send electrical signals into the computer. Pressing a key on a keyboard, clicking a mouse, tapping a touch screen, pushing a button on a game controller, and speaking into a microphone are all examples of using input devices. Inputs are often used to send commands to the software application that in turn stores the information in system memory, known as Random Access Memory (RAM).


Data Processing Processor Chip

When the signals are received, the operating system in the computer performs calculations on the input and converts the raw electrical signals into information that can be used. The information is often stored in RAM. Data processing occurs when the Central Processing Unit (CPU) retrieves the information from RAM and manipulates it according to instructions from an application. After the processing is complete, the changed information is stored back in RAM.


2.2.3 History of Computers (Lesson Video) Transcript:

In today's world, computers are everywhere. Just about every aspect of our society, from global communications and transportation to education, shopping, and even dating, has been influenced by computers. For many young people today, it can be hard to imagine what life must have been like before smartphones and the Internet. In this video, we're going to briefly outline the history of computers from the first electronic computing machine to the present day.

The first electronic computing machine was invented by Herman Hollerith to compile data for the 1890 United States census. Hollerith's machine, which he called a tabulating machine, worked by punching census data onto paper cards. For example, if a person was female, the census taker would punch out the female spot on the card. Then, they'd feed the card into the tabulating machine, which would detect which holes had been punched and record the data. Hollerith later founded the Tabulating Machine company, which eventually became International Business Machines, or IBM.

As IBM's machines grew more powerful, they also grew in size. Many early computers were big enough to fill a whole room and weighed thousands of pounds. Because early computers were large, expensive, and difficult to maintain, most

computers belonged to businesses, governments, and universities. Part of the reason they were so big was that they relied on large triode vacuum tubes to relay information through the system. This changed in 1947, when scientists at Bell Laboratories invented the transistor. Transistors were able to replace the bulky vacuum tubes, which made computers smaller. Because transistors are made with silicon, and because most of the research was done in California's Santa Clara Valley, that area became known as "Silicon Valley."

One of the next major breakthroughs in computing was in 1959, when Jack Kilby invented the microchip. With this new technology, it became possible to have an entire computer on a single circuit board instead of in a large and bulky machine. This made computers much smaller and cheaper to manufacture and paved the way for personal computers in the home.

In 1977, three successful personal computers were released: The Apple II, the TRS-80 Model 1, and the Commodore Pet 2001. Four years later, IBM followed up with the IBM PC. Since these new computers were inexpensive to buy and easy to use, personal computer ownership started to take off. Most people who owned computers during this period used them primarily as tools for work. Before the spread of PCs, almost all word processing was done on typewriters. Now,

people could type and save documents on their computer. About this time, video arcades became popular, featuring titles like Pac Man, Galaga, and Donkey Kong.

Word processing was the most widely used personal computer application until the mid-nineties, when the World Wide Web became available to the public. Using a device called a modem, users could dial into their Internet Service Provider over their telephone line. Before long, the Internet became a part of everyday life. People could work, shop, and communicate with friends and family at any time, as long as they had access to a computer.

Internet access was mostly limited to desktop and laptop computers until 2007, when Apple released their first smartphone, the iPhone. With smartphones, people could access the Internet from anywhere using a device small enough to fit in their pocket. Today, almost all cell phones are smartphones.

Computers and the Internet have transformed society and are central to the modern world. At the rate we've been advancing, it's likely only a matter of time before today's cutting-edge technology seems as old and clunky as the first tabulating machines.

2.2.4 Computer History Facts

The table below outlines a few major events in the history of computers from the turn of the 20th century to the present day.

Table 1: Timeline of Important Events in Computer History YEAR

EVENT


1890 - Hollerith's Tabulating Machine

At the end of the 19th century, the population of the United States was rapidly growing. Because there were so many people, the 1880 census took seven years to compile, and it was predicted that the 1890 census would take nearly twice as long. To solve this problem, the government hired Herman Hollerith to devise a solution. Hollerith created an electromechanical tabulating machine to process the census data. It worked by punching data into paper cards, then inserting them into the machine. Inside the machine, small metal pins would pass through the holes into a vial of mercury, completing an electrical circuit. This in turn powered an electric motor, which turned the appropriate gear in the machine to keep track of the count. Using this machine, the entire census was compiled in two and a half years.


1944 - Harvard Mark 1 Completed

Working together, engineers from Harvard University and IBM created the Harvard Mark 1, which at the time was the most powerful computing machine ever built. It was fifty feet long, weighed five tons, and was built from about 750,000 individual mechanical parts. The Mark 1 was used by the Allies during World War II and assisted in creating simulations for the Manhattan Project. It could perform three additions or subtractions every second and one multiplication every six seconds.


1947 - First Transistor Developed

Early computers sent signals via mechanical relays. Relays were metal switches that would physically move to make and break electrical circuits, representing 1s and 0s. Because the parts had to physically move, they were slow and tended to wear down over time. In 1947, scientists at Bell Laboratories invented the transistor. Transistors contain silicon, a semiconductor that can be made to sometimes conduct electricity and sometimes not. Because they didn't have

any moving parts, silicon transistors were smaller, faster, cheaper, and more durable than mechanical relays.


1959 - Invention of the Microchip

Throughout the 1950s, computers were large and expensive. Most computers were owned by governments, universities, and businesses - they had no place in the typical home. Then, in 1959, researchers at Texas Instruments developed an integrated circuit, or microchip. This new technology allowed an entire computer to be built into a single board,


rather than needing large modules for each part of the computer. Microchips paved the way for personal computer ownership.


1977 - The Personal Computer Revolution

In 1977, three successful personal computers were released to the public: The Apple II, the TRS-80 Model 1, and the Commodore Pet 2001. These three computers became known as the "1977 trinity." 1977 also saw the release of the Atari 2600, the first popular home video game console. For the first time, computers were marketed to the general public rather than just businesses and hobbyists. Four years later, IBM followed up with the IBM PC, giving birth to the PC/Apple rivalry that still exists today.


1994 - The World Wide Web

Personal computer ownership began to skyrocket in the mid-nineties with the advent and rise of the World Wide Web, which began in 1991. In 1994, the web became public, and the world got a lot smaller. With new technology like email and chatrooms, computers became a viable way of communicating with other people and thus became more popular. In the early 2000s, social media sites like MySpace and Facebook were launched.


2007 - Smart Phones

Through the mid 2000s, Internet access was mostly limited to computers and laptops. Then, in 2007, Apple unveiled the iPhone, the world's first smartphone. Now, people could access the Internet anywhere. Smartphones are now extremely common in the developed world, almost completely replacing other kinds of personal telephones.


2.2.5 Supercomputers

Photo of the ILLIAC IV, completed in 1972


The ILLIAC IV, a supercomputer from the 1970's.

Supercomputers are the fastest, most powerful computers that exist at a given time. These computers have powerful processing capabilities designed to solve problems that are too complex for regular computers. The development of supercomputers has played a vital role in the advancement of national defense, scientific discoveries, and social change. This lesson will cover some of the historic developments in supercomputing from the 1950s to the present.

Naval Ordnance Research Calculator

In 1954, IBM created its first supercomputer called the Naval Ordnance Research Calculator (NORC). It was built under the direction of Wallace Eckert at Columbia University and used electrostatic tubes for memory which could store 2,000 words with an access time of 8 microseconds. Costing $2.5 million, it was considered the most powerful computer on earth from 1954 to 1963 and remained in service until 1968. NORC was a hotly contested technology at the time and several prominent facilities and physicists tried to win over the privilege of having it. Ultimately, the Navy gave it to a crew at Dahlgren, Virginia because the Naval Sea System Command at that location was already experienced with supercomputing. NORC was dedicated at Dahlgren on December 2, 1954. At the presentation ceremony, NORC calculated Pi to 3,089 digits in 13 minutes, which was a record at the time.

CDC6600 and 7600

In 1965, Seymour Cray built a supercomputer called the CDC 6600 while working for the Control Data Corporation. It was roughly the size of four filing cabinets, weighed about 12,000 pounds, and had more than 100 miles of wiring.

Cray's goal while developing the CDC 6600 was to deliver the fastest performance possible. When it was completed in 1965, it could execute 3,000,000 instructions per second - 10 times faster than any other computer at that time. The

release of the CDC 6600 created a fierce rivalry between IBM and the Control Data Corporation.

The successor to the CDC 6600 was built in 1967 and was named the CDC 7600. This model used pipelining, which is the ability to run several stages of an instruction at the same time to increase performance. The CDC 7600 was 10 times faster than the CDC 6600. When the system was released in 1969, it sold for around $5 million. From about 1969 to 1975, the CDC 7600 was regarded as the fastest computer in the world. But even with its advanced mechanicals and cooling, the computer was reported to break down at least once a day.

ILLIAC IV

In 1964, the Defense Advanced Research Projects Agency (DARPA) funded a project at the University of Illinois called ILLIAC IV. It was noted as being one of most complex computers in history. It was completed in 1972 and was the first to use

solid-state memory. The ILLIAC IV also was a single instruction, multiple data (SIMD) computer, meaning the same instruction was applied to all processors at once. After years of modifications, the ILLIAC IV became the first network- available supercomputer in November of 1975 when it was connected to the Advanced Research Projects Agency Network (ARPANET). This was a network created to link computers at Pentagon-funded research institutions over phone lines. On September 7, 1981, after roughly 10 years in operation, the ILLIAC IV was turned off. In the 1980s many supercomputers based on the ILLIAC IV's concepts were successfully developed.

Cray Research, Inc

After Seymour Cray left the Control Data Corporation in 1972, he opened a Cray Research lab in his home town of Chippewa Falls, Wisconsin. Their first supercomputer was the CRAY-1 in 1975. It was a vector computer that boasted world-record speeds of 160 megaflops and had 8MB main memory. The vector concept had only one main processor that was optimized to do the same instruction on several pieces of data.

Cray's unusual approach to developing his supercomputers was unlike any of his competitors. Instead of asking customers what they needed, he built the fastest computer possible and then showed them the need for such a system. Cray even gave some institutions free trials of his supercomputers. This made them realize their need for faster computing. The first Cray-1 was installed at Los Alamos National Laboratory and sold for $8.8 million. It was considered the fastest computer in the world until 1981.

In the 1990s, Cray Research continued to lead the way in developing top-of-the-line supercomputers. The Cray C90 system, introduced in 1991, was the first to feature a central processor with industry-leading performance of 1 gigaflop (1 billion floating-point operations per second). Using 16 powerful processors and 256 million words of central memory, this model displayed unrivaled performance.

Debuting in 1995, the Cray T3E was the world's best-selling, massively parallel processing (MPP) computer. Four years later, though, the Cray T3E-1200E broke the gigaflops barrier when it was the first supercomputer to sustain 1 teraflop on a real-word application. Cray Research hit another milestone in 1994 when they unveiled the Cray T90, which was the world's first wireless supercomputer. Also that year, the Cray J90 series was released and became the world's most popular supercomputer with over 400 systems sold.

The Market and the Future

Even though Cray Research has been the most popular supercomputer manufacturer over the decades, there have been many key players in the supercomputer business as well. In the 1980s, the massive surge of companies developing supercomputers was largely thanks to the increased support and funding from DARPA. In the 1990s, many companies wanted to rank among the Top500 project. This is a list that biannually ranks the top 500 fastest supercomputers in the world. The Top500 project uses LINPACK, a benchmark based on the solution of linear systems of equations to compare the performance of different systems. Even though LINPACK is based on measuring a system's floating-point computing power, the Top500 ranking is useful because of the historical record it's provided since 1993. Being on this list is considered a prestigious title and can help a company secure grants for further development. In 2019, IBM takes the top spot on the Top500 project list with the AC922 system. This system has 2,414,592 cores, 2,801,644GB RAM, and an IBM POWER9 22C 3.07GHz processor.

In May of 2019, the US Department of Energy announced a $600 million contract with Cray Technologies and ADM for the world's fastest supercomputer to be completed by 2022. The system was named Frontier and will be built for the Oak Ridge National Laboratory in Tennessee. It's expected to produce more than 1.5 exaflops of processing power. It'll be used to perform advanced calculations in areas of nuclear and climate research and will be fast enough to process 100,000 HD movies in one second. With its speed comes a large footprint. The system will take up approximately 7,300 sq. feet and contain 90 miles of cabling.

As technology evolves, so will the state of supercomputing. Each year, computers continue to become faster, smaller, and capable of incorporating new technologies. In the last 50 years, computers have become 3.3 billion times faster and

memory chips can store 2 billion times as much data as in 1965. In an article published in Electronics Magazine on April 19, 1965, Intel co-founder Gordon Moore stated that the density of transistors (the number of transistors on a given die area) would double every two years, which leads to double the performance. Loosely translated, this means that in 18 to 24 months you can buy a faster computer than what you have today using the same amount of money. As this model continues to hold true, the evolution of supercomputers continues right along with it.

2.2.6 Human-Computer Interaction


Boy and girl interacting with their computers. Illustration.

Human-computer interaction (HCI) is a field of study that looks at how computers and other kinds of technology interact with humans. HCI is a discipline that arose in the 1980s as computers became available in people's homes. It encompasses almost all other conceivable fields of technology, from IT to website design principles.

A Focus on User Design

HCI informs how devices and software are designed to be user friendly. It helps those who focus on user-centered design (UCD), which is a process where a design team takes on the needs of the end user at every phase of the process. They want to make their products as accessible as possible.

It also informs user interface (UI) design, which is a design process that focuses mainly on the look or style of a program. UI seeks to create a visual experience for the user that will be simple to use, enjoyable to look at, and meaningful.

For example, if a software company is creating a word processing program, they would need to think about an interface style that's simple and intuitive while still having the features that users are looking for. Users expect such things as editing tools, multimedia support, and secure backups. A development team would take into account small details like making sure the interface isn't overwhelming or that fonts are large enough for users not to strain their eyes.

The Questions of Human-Computer Interaction


A woman using her laptop computer. Illustration.

Whether you're a software engineer or computer technician, there are several questions that are useful to consider when investigating how humans and computers interact.

1. Why are people using computers? What motivates them and what do they value?


2.2.7 Section Quiz (Section Quiz) q_itf2_introtocomputers_01

Which of the following is a type of input device? Answers:

• *Touchscreen


• Speakers


• Monitor


• Hard drive


Explanation:

Touchscreen is the only option that is an input device. Input devices are used to physically put information into the computer.

Speakers and monitors are both output devices. A hard drive is a storage device. q_itf2_introtocomputers_02

Which of the following is data temporarily stored on? Answers:

• Hard drive


• *Memory chips

• Keyboard


• Printed page


Explanation:

Data can be stored temporarily on memory chips (this is often considered to be part of processing). A hard drive is used to store data long term.

A keyboard is considered to be an input device A printed page is considered to be output q_itf2_introtocomputers_input

Which of the following are examples of input devices? (Select two.) Answers:

• Monitors


• *Keyboards


• Speakers


• *Touch Screens


• Projectors


Explanation:

Before a computer can work, someone needs to physically put information into it. In computer terms, this is called input. Pressing a key on a keyboard, clicking a mouse, tapping a touchscreen, pushing a button on a game controller, and speaking into a microphone are all examples of input.

A monitor is an output device for displaying the results of computer processing.

A speaker is an output device for providing audio signals as a result of computer processing.

A projector is an output device for providing a projected image as a result of computer processing. q_itf2_introtocomputers_output

One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process?

Answers:

• Peripheral device


• *Output


• Speaker


• Input


Explanation:

One option that a computer has for the information gathered in data processing is to return information to the user. This is called output. Examples of output are images on a screen, sounds from speakers, and printed pages.

A peripheral device can be an output device, but it does not describe the process of returning information to the user. While a speaker is an output device, it does not describe the process of returning information to the user.

Input describes the process of physically putting information into the computer, not returning information to the user. q_itf2_introtocomputers_processing

Which of the following BEST describes computer data processing? Answers:

• Data is saved to a hard disk.


• A document is scanned by a user.


• A graphic image is displayed on a screen.


• *Data in memory is converted to information.


Explanation:

Input devices (keyboards, mice, etc.) send data to the computer memory. The computer then performs calculations on the input data (based on instructions from the OS or application software), converting the data into information. This is called data processing.

Data saved to a hard disk is an example of the result of data processing, not the process itself.

A document scanned by a user is an example of data input. However, this does not describe computer data processing. A graphic image displayed on a screen is an example of a data processing result, not the process itself. q_itf_introtocomputers_sys_facts_01

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?

Answers:

• *Processing


• Input


• Output


• Storage


Explanation:

Processing occurs after input has been provided to a computer. In this case, the user's input was a text string and mouse click. Processing takes the mouse click on the search icon to start the search process.

Input is information provided to a computing process. Output is the result of a computing process.

Storage is where output data is retained for later. q_itf_introtocomputers_sys_facts_02

Which of the following lists the basic computing and processing steps in order? Answers:

• *Input, processing, output, and storage


• Input, retrieval, output, and storage


• Input, retrieval, processing, and storage


• Input/output, processing, and storage


Explanation:

Input, processing, output, and storage are the basic computing and processing steps performed by a computer in order. Retrieval is not a basic part of the process.

q_itf_introtocomputers_sys_facts_03

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time? Answers:

• *Storage

• Transistor


• Processing


• Microchip


Explanation:

Storage is where output data is retained for later use.

A transistor is a smaller, faster, cheaper, and more durable electronic device that replaced mechanical relays. Input is information provided to a computing process.

A Microchip is an electronic device that allowed entire computers to be built into a single board. q_itf2_history_01

Which of the following was the most widely used personal computer application until the mid-90s? Answers:

• Games


• Internet


• *Word processing


• United States census


Explanation:

Word processing was the most widely used personal computer application until the mid-90s, when the world wide web became available to the public.

Video arcades were very popular, but these games weren't heavily played on personal computers.

The internet first became available to the public in the mid-90s and quickly became a part of everyday life.

The first electronic computing machine was invented by Herman Hollerith to compile data for the 1890 United States census.

q_itf2_history_02

Which invention made it possible to have an entire computer on a single circuit board? Answers:

• Transistors


• *Microchip


• Silicon


• Vacuum tubes


Explanation:

Jack Kirby invented the microchip in 1959. This made it possible to have an entire computer on a single circuit board. This made computers much smaller and cheaper to manufacture.

The transistor was invented in 1947. Transistors replaced bulky vacuum tubes and mechanical relays. This made computers smaller.

Silicon is the material used to make transistors.

Vacuum tubes were used in many early computers to relay information through the system. q_itf2_history_03

Which invention allowed computers to become smaller in size? Answers:

• Vacuum tubes

• Silicon


• Laptops


• *Transistors


Explanation:

The transistor was invented in 1947. Transistors replaced bulky vacuum tubes and mechanical relays. This made computers smaller.

Vacuum tubes were used in many early computers to relay information through the system.

Silicon is the material used to make transistors, but it is not what allowed computers to become smaller in size. Laptops are smaller, portable computers. They are not the invention that allowed computers to become smaller in size. q_itf_history_comp_hist_facts_01

Put the following events from computer history in the order they happened:

Answers:

• The World Wide Web becomes available to the public


• Scientists at Bell Laboratories invent the transistor


• Apple releases the iPhone


• Herman Hollerith develops electronic tabulating machine


• International Business Machines, or IBM, is formed


• The Apple II is released for home consumers


• Jack Kilby invents the microchip


Explanation:

The correct order is:

• Herman Hollerith develops electronic tabulating machine (1890)


• International Business Machines, or IBM, is formed (1911)


• Scientists at Bell Laboratories invent the transistor (1947)


• Jack Kilby invents the microchip (1959)


• The Apple II is released for home consumers (1977)


• The World Wide Web becomes available to the public (1994)


• Apple releases the iPhone (2007)


q_itf_history_comp_hist_facts_02

Which of the following played vital roles in the advancement of national defense, science, and social change? Answers:

• Smartphones

• *Supercomputers


• World wide web


• Microchip


Explanation:

Supercomputers have processing capabilities designed to solve problems that are too complex for regular computers. They play vital roles in the advancement of national defense, science, and social change.

A smartphone is a mobile phone that functions as a computer and allows users to access the internet.

The world wide web is a system for making digital resources publicly available over the internet. The web and web browsers paved the way for email, chatrooms, and social media sites.

Microchips paved the way for personal computer ownership.

2.3 Digital Data Section Introduction

As you study this section, keep the following questions in mind:

• How are digital and analog data similar? How are they different?


• How are words and numbers encoded as ones and zeros?


• What is the relationship between the binary number system and computer hardware?


This section explains the basics of how computers work, including their use of the binary number system and the translation of physical signals into digital information. After finishing this section, you should be able to:

• Describe the binary number system used by computers to process data.


• Describe how binary numbers can be translated into hexadecimal form.


• Define bits and bytes.


• Explain how physical signals are translated into digital information.


• Describe the most common character encoding standards, including ASCII and Unicode.


• Describe the most common units of measurement used for storage, throughput, and processing speed.


Key terms for this section include the following:

Term Definition


Decimal System

A numbering system that uses ten digits, 0 through 9.


Binary System

A numbering system that uses two digits, 0 and 1.


Hexadecimal System

A numbering system that uses sixteen digits, 0 through 9, and A through F. Bit

The smallest unit of digital information, represented by a 1 or 0.


Byte

A group of eight bits joined together.


Digital Data

A physical signal, such as text, numbers, graphics, or sound, interpreted by converting it into binary numbers.


Encoded Integers

The representation of integers using a group of bytes. Normally, one bit in one of the byes represents the sign, 1 for negative and 0 for positive. The remaining 31 bits are used to encode the number itself using binary digits.


Encoded Text

The representation of text by assigning a unique binary code to each character.


Processor Speed

The speed at which a computer processes information, as measured by the number of cycles per second (Hertz) that the computer's CPU operates at. Processor speed is measured in kilohertz, megahertz, and gigahertz.


Storage Space

The measurement in bytes of the volume that a storage device can contain. Storage space is measured in kilobytes (1024 bytes), megabytes (1024 kilobytes), gigabytes (1024 megabytes), and terabytes (1024 gigabytes).


Throughput

The measurement in bits per second that information is transferred through a network from one computer to another. Throughput is measured in Kbps (kilobits per second), Mbps (megabits per second), and Gbps (gigabits per second).


ASCII

Pronounced ask-ee and short for American Standard Code for Information Interchange, the most common format for text files in computers on the internet where each character is represented by a unique 7-bit binary code. Extended ASCII uses an 8-bit binary code and allows for international characters.


Unicode

An international 16-bit encoding standard that accommodates character sets from multiple languages, with each letter, digit, or symbol being assigned a unique numeric value.


2.3.1 Number Systems (Lesson Video) Transcript:

When we count things, we use ten digits – zero through nine. This system of ten digits is called the decimal system. However, it's not the only way to express numbers. In this video, we're going to learn about two other systems that are used by computers – binary and hexadecimal. Now, this video is going to talk about some math, but don't worry – we won't make you do any math on the test.

When we count in decimal, we start at zero, then go through each digit all the way to nine. Once we hit nine, we change the nine to a zero and put a one in front to give us the number ten. This pattern continues for the tens place. Once we get to nine tens and nine ones, we change them both to zero and add one to get a hundred.

Binary numbers work the exact same way, but use only two digits – one and zero. Counting starts at zero, then goes to one. Since one is the highest digit, counting continues by changing the one into a zero, then adding a one in front of it. This looks like the decimal number ten, but it's actually the binary number two, which comes after the number one. To continue counting, we add another one, then change both ones to zeroes and add a one in front.

Let's look at it another way. Here's the decimal number 217. This number is made of two hundreds, one ten, and seven

ones. The ones place can be expressed as ten to the zero power. Tens are ten to the first power, and hundreds are ten to the second.

This is the same number, 217, written in binary. These numbers along the top represent the powers of two, just like they represented the powers of ten in decimal. This binary number is made of a one, zero twos, zero fours, one eight, one sixteen, zero thirty-twos, one sixty-four, and one 128. If we add all these values, we get 217.

At this point, you may be asking yourself, "Why is binary so important? Why can't a computer just use decimal like a normal person?" The answer has to do with how computers work. For a computer, data exists as physical signals, such as electric charge. Electric charge can be positive or negative – those are the only two options. By interpreting positive charges as ones and negative charges as zeros, the computer can turn the physical signal into a number – digital data. It can then use that number to perform computations and calculations, resulting in useful information.

Now, let's take a look at the hexadecimal number system, which uses sixteen digits – the numerals 0 through 9, then the letters A through F. Just like the other systems, counting in hex starts at zero, goes up through each digit, then resets to zero with a one in front. If we keep counting up we'll get to the hexadecimal number FF, followed by 100.

By now, you're surely wondering why anyone would ever use such a silly number system. The reason has to do with how well hex translates to binary. The hex number F is equal to the binary number 1111. Adding one to either number will increase the number of digits in the number. This means that a single hex digit can represent four binary digits.

Look at this binary number. It's huge! Can you imagine being a programmer and having to type this whole thing out? Let's translate it into hex. All we have to do is break it up into chunks of four digits, find the hex value for each chunk, and voilà! A nice, easy-to-type hex number with the exact same value as the original binary.

We've just taken a first look at two number systems – binary and hexadecimal. Don't worry if you feel a little overwhelmed by the math. The most important thing is to know that binary represents physical signals inside the computer, and hex is an easy way for humans to represent binary numbers.

2.3.2 Number System Facts

2.3.3 Digital Information (Lesson Video) Transcript:

As you know, we live in an increasingly digital world. But, what exactly does "digital" mean? Let's take a look. Everything that happens on a computer is the result of real-world physical signals. For data traveling through a wire, the signal may be positive and negative electric charges. Many hard drives use tiny particles that can have either a north or south magnetic charge. Optical discs like CDs and DVDs are covered in microscopic light and dark spots. In every case, the two types of signals can be represented conceptually by ones and zeroes. When a physical signal is interpreted by converting it into binary numbers, it's called digital data, which is the foundation of how modern computers work.

Each individual signal, each one or zero, is called a bit. Eight bits together are called a byte. Each byte has 256 possible combinations of ones and zeroes – from eight zeroes all the way up to eight ones. You may have heard of eight-bit computers, graphics, or audio. These are computers that can process eight bits, or one byte, at a time. Eight-bit graphics, such as for eight-bit video games, were limited to only 256 colors, since one byte has 256 combinations. Today's computers generally run on 32- or 64-bit operating systems, which means they can process four to eight bytes at a time. As opposed to 8-bit systems that have 256 combinations of ones and zeroes, 32-bit systems have almost 4.3 billion combinations. Compare this 32-bit picture with this 8-bit picture and see the difference.

One of the most important things computers do is to represent text. Let's look at a common way to encode text in binary. Here's a simple two-word sentence (Hello world!). Each character has a unique binary code to represent it. For example, the code for this capital H is 01001000. Altogether, the sentence can be encoded like this. Remember, these 1s and 0s are just stand-ins for physical signals, such as magnetic or electrical charge, but by converting the signals to binary, the computer can display the sentence.

Next, let's look at how to encode integers. With 32 bits, you can represent numbers up to nearly 4.3 billion, or thirty-two ones in binary. However, integers can have a positive or negative value, so there has to be a way to encode that information. Computers do this by using the first bit for the sign – one for negative and zero for positive. Then, the remaining 31 bits are used to encode the number itself, giving us a range from about negative 2 billion to positive 2 billion.

Since bits and bytes are so small, we don't normally talk about them individually. Instead, we use the metric system to describe a lot of them together. When we talk about data storage, we usually refer to the number of bytes. One kilobyte of storage space is the same as 1,024, or two to the tenth bytes. A megabyte is about a million bytes, or 1024 kilobytes. A gigabyte is about a billion bytes, or 1024 megabytes. A terabyte hard drive has 1024 gigabytes of storage space.

When we talk about throughput, or data transmission from one computer to another, we usually refer to the number of individual bits that can be transmitted in one second. For example, a gigabit Internet connection can send a billion ones

and zeroes every second. Note that in the abbreviations we use a lowercase b for bits and an uppercase B for bytes. Finally, let's talk about processing speed. We mentioned earlier that 64-bit processors process eight bytes of data at a time. In other words, it can receive or send eight bytes of data at once. Each time the processor writes data to memory or reads data from memory is called a cycle. Just like with storage and throughput, we use the metric system to describe how fast a processor can execute cycles. The base unit of measure is the Hertz. One Hertz means one cycle per second. A 64-bit, two gigahertz processor can process eight bytes of information two billion times each second. That's a lot of ones and zeroes.

We've just learned that the word "digital" refers to computers interpreting physical signals as ones and zeroes, called bits, and that eight bits form a byte. We also saw how bits can be used to represent text and numbers. We ended by discussing units of measure for storage, throughput, and processing speed.

2.3.4 Digital Information Facts

This lesson covers the topic of digital information. Digital Information

Computers work by translating physical signals, such as electrical charges, into digital information. They do this by encoding each signal as either a 1 or a 0. The table below summarizes essential terms for understanding digital information.

Table 1: Digital Information Term

Definition


Bit

The smallest unit of digital information. Each individual one and zero in a binary sequence is a


Byte

Eight bits together form a byte. The value of a single byte can range from 0 (eight 0s) to 255


Kilobyte (KB)

One kilobyte is equal to 1,000 bytes.


Megabyte (MB)

One megabyte is one million bytes of information. Therefore, 1 megabyte equal


Gigabyte (GB)

One gigabyte is one billion bytes. Therefore, 1 gigabyte equals 1,000 megabytes.


Terabyte (TB)

One terabyte is equal to 1,000 gigabytes.


Digital data

A physical signal, such as text, numbers, graphics, or sound, interpreted by converting it into


Encoding

Integers can have a positive or negative value. Computers encode 32 bit by using the first bit


Encoding text

Computers represent text by using 1s and 0s as stand


Processing In 64

Storage

Data storage usually refers to the number of bytes. Since bits and bytes are so small and can't


Throughput

Throughput, or data transmission from one computer to another, usually refers to the number of


System

A computer needs memory space available for processing. Processing would be very slow if


2.3.5 Data Representation (Lesson Video) Transcript:

In this video, we're going to look at two schemes that computers can use to translate binary code into text – ASCII and Unicode.

ASCII, or the American Standard Code for Information Interchange, was developed in 1963. ASCII was a seven-bit code, which means it could represent 128 different characters – from seven zeroes all the way up to seven ones. Each letter and symbol was assigned a number between 0 and 127. Capital S was 83, lowercase s was 115, and the dollar sign was 36. With 128 values, there was plenty of space for the entire English alphabet, the numerals 0 through 9, and the most common punctuation marks.

These 128 characters worked great for English but weren't sufficient for writing in other languages. Fortunately, since a byte has eight bits and ASCII used only seven, there was plenty of space to add new characters. People started adapting

codes 128 through 255 to meet their own needs. In the United States, it was common to use these extended characters for additional symbols, such as accented letters and math symbols.

However, other countries had other needs. In Russia, they were used to encode Cyrillic characters, Israel used them for Hebrew characters, Thailand used them for Thai characters, and so on. This system worked well enough, until it became more common to transfer files between computers internationally. Résumés sent from Americans to Israel would arrive as R.sum.s because the accented é and the Hebrew letter Gimel were both encoded to number 130. And that's to say nothing of languages like Chinese and Japanese, which have thousands of characters each. With the Internet just around the corner, a better solution was desperately needed.

In 1992, a group called the Unicode Consortium released the first version of Unicode. Unicode used 16-bit encoding and was capable of representing millions of different characters – enough space for every character from every human language, with plenty of room to spare. So much room, in fact, that developers started assigning Unicode values to pictures, called emoji. With Unicode, computers around the world can access files in any language and be assured they'll display properly.

We've just learned about two text encoding standards – ASCII, which was used in the early days of computers, and Unicode, which is widely used today.

2.3.6 Data Representation Facts

This lesson covers the topic of schemes. Schemes

This following table summarizes schemes that computers can use to translate binary code into text. Table 1: Schemes

Scheme Description


American Standard

ASCII was developed in 1963. ASCII is a seven


Unicode

In 1992, a group called the Unicode Consortium released the first version of Unicode.


2.3.7 Section Quiz (Section Quiz) q_itf_numsystems_binary

Which of the following is the binary number equivalent of the hexadecimal number F5C8? Answers:

• 1101001110111001


• *1111010111001000


• 1010010011010001


• 1101000110100100


Explanation:

1111010111001000 is the correct conversion of the hexadecimal number to binary. You can calculate the conversion by breaking down the hexadecimal number's four individual characters (5, F, 8, and C) and then converting each individual character into its hexadecimal equivalent (F = 1111, 5 = 0101, C = 1100, and 8 = 1000).

1101001110111001 is a conversion from the hexadecimal number D3B9. 1010010011010001 is a conversion from the hexadecimal number A4D1. 1101000110100100 is a conversion from the hexadecimal number D1A4. q_itf_numSystems_facts_01

Which of the following is the correct binary representation of the number 22? Answers:

• *10110


• 10101


• 10111


• 11000


Explanation:

10110 in binary is the same as 22 in decimal. 11111 in binary is the same as 21 in decimal. 10111 in binary is the same as 23 in decimal. 11000 in binary is the same as 24 in decimal. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf_numsystems_facts_02

Which of the following notational systems is MOST likely used to represent a MAC address? Answers:

• *Hexadecimal


• Binary


• Decimal


• Octal


Explanation:

The hexadecimal number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. MAC addresses are typically composed of six groups of two hexadecimal digits separated by hyphens or colons.

The binary number system works the exact same way as the decimal number system but uses only two digits - 1 and 0. The decimal number system uses ten digits from 0 to 9.

The octal number system uses eight digits from 0 to 7. q_itf_numsystems_facts_03

A network host has an IPv4 address of 192.168.12.155. Which of the following notational systems is used to represent this IP address?

Answers:

• *Decimal


• Binary


• Hexadecimal


• Octal


Explanation:

The decimal number system uses ten digits from 0 to 9. The IP address shown is in dotted decimal notation.

The hexadecimal number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. IPv6 addresses utilize the hexadecimal number system.

The binary number system works the exact same way as the decimal number system but uses only two digits - 1 and 0. The octal number system uses eight digits from 0 to 7.

q_itf_numsystems_facts_04

Given the numerical value 1010101.11, which of the following number systems is MOST likely represented? Answers:

• *Decimal


• Binary


• Hexadecimal


• Octal


Explanation:

1010101.11 represents a decimal number with two decimal places that consist of 1s and 0s.

The binary number system uses two digits - 1 and 0. In practice, binary numbers do not use decimal points. In fact, the word "decimal" in decimal point refers to the decimal number system.

The hexadecimal number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. Octal is a base-8 number system and uses the digits 0 through 7.

q_itf_numsystems_facts_05

Which single digit has the highest value in the hexadecimal number system? Answers:

• *F


• G


• 9


• 0


• H


Explanation:

The hexadecimal number system uses sixteen digits - the numerals 0 through 9 followed by the letters A through F. q_itf_numsystems_hex_01

April, a programmer, wants to convert the binary number 1111001101011011 to a hexadecimal number. What is the recommended first step to perform this conversion manually?

Answers:

• Break up the binary number into chunks of two digits.


• *Break up the binary number into chunks of four digits.


• Find the hex value for each chunk of binary digits.


• Convert the binary number to a decimal number.


Explanation:

A better way to represent a binary number is to translate it into hex by first breaking it up into chunks of four digits and finding the hex value for each chunk.

The binary number needs to be broken up into chunks of four digits, not two digits. Finding the hex value for each chunk of binary digits is the second step.

While you can convert binary numbers to decimal numbers, this conversion is not a necessary step in converting binary numbers to hexadecimal notation.

q_itf_numsystems_hex_02

A network engineer needs to convert the binary number 1101100110110011 to a hexadecimal number. Which of the following is the correct hexadecimal number?

Answers:

• D3B9


• C9D3


• *D9B3


• D3C9


Explanation:

D9B3 is the correct conversion of the binary number to hexadecimal notation. You can calculate the conversion by breaking down the binary number into sets of four digits (1101, 1001, 1011, and 0011). Then you convert each set of four digits into its hexadecimal equivalent (1101 = D, 1001 = 9, 1011= B, and 0011 = 3).

D3B9 is a conversion from the binary number 1101001110111001. C9D3 is a conversion from the binary number 1100100111010011. D3C9 is a conversion from the binary number 1101001111001001. q_itf_numsystems_power

In the decimal number system, you can think of each digit representing a place (or column) in the number. For example, in the decimal number 652, the two, the five, and the six are all in different places and each place can be expressed as 10 to a specific power.

Which power of 10 does 6 in the above example represent? Answers:

• 10 to the third power


• 10 to the zero power


• *10 to the second power


• 10 to the first power


Explanation:

The decimal number 652 is made of six 100s, five 10s, and two 1s. The 6 is in the hundreds place and is 10 to the second power.

10 to the third power is in the thousands place, but there are no thousands in 652. 10 to the zero power is in the ones place and represents the 2.

10 to the first power is in the tens place and represents the 5. q_itf_digInfo_byte

The basic (and smallest) unit of computer information is the bit (binary digit). Memory and file sizes are commonly measured in multiples of bits.

What is the first multiple of a bit called? Answers:

• Kilobyte


• *Byte


• Kbps


• Decimal

Explanation:

The first multiple of a bit is called a byte, which is eight bits.

The second multiple of a bit is called a kilobyte (KB), which is 1,000 bytes. It is not the first multiple of a bit.

Kbps is a measurement of the rate at which data is transferred between components in a computer or between computers in a network. It represents 100 bits per second. However, it is not a measurement of memory or file size.

Decimal is a numeric notation system and can be used to indicate storage capacity. However, it is not a measurement of memory or file size.

q_itf_digInfo_facts_01

How many bits are in a single byte? Answers:

• four


• *eight


• twelve


• sixteen


Explanation:

One byte is made of eight bits. Each byte has 256 possible combinations from 00000000 to 11111111. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf_digInfo_facts_02

Which of the following is the best definition of a bit? Answers:

• *A single 1 or 0 in a digital signal


• An electrical signal in a wire


• A measure of computer graphics and sound


• A physical signal that becomes a digital signal


Explanation:

A bit is a single 1 or 0 in a binary digital signal. Eight bits together form a byte. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf_digInfo_facts_03

Arrange the following from smallest to largest. Answers:

• Megabyte


• Terabyte


• Kilobyte


• Gigabyte


Explanation:

A kilobyte is the same as 1024 bytes.

A megabyte is about a million bytes, or 1024 kilobytes.

A gigabyte is about a billion bytes, or 1024 megabytes. A terabyte is about a trillion bytes, or 1024 gigabytes. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf_digInfo_facts_04

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store?

Answers:

• *3 terabytes


• 1,024 kilobytes


• 8 megabytes


• 4 gigabytes


Explanation:

Storage of modern hard disk drives are available in multiples of terabytes. The other capacities are too small to work well for video storage. Listed in order of increased capacity: kilobyte > megabyte > gigabyte > terabyte. q_itf_digInfo_facts_05

Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates currently available to consumers is the FASTEST for network switches?

Answers:

• *Gbps


• Kbps


• Mbps


• Tbps


Explanation:

The fastest network switch available to consumers is a gigabit switch with transfer rates measured in Gbps.

Previously, transfer rates were commonly Mbps for network switches. Kbps and Tbps are not available for consumers, as Kbps is too slow and Tbps is experimental.

q_itf_digInfo_facts_06

Which of the following transfer rates is the FASTEST? Answers:

• *1,480 Mbps


• 1,282 Kbps


• 181 Mbps


• 1.24 Gbps


Explanation:

1,480 Mbps is equal to 1.48 Gbps, and so it is the fastest transfer rate listed because it is greater than 1.24 Gbps. In summary, 1,480 Mbps > 1.24 Gbps > 181 Mbps > 1,282 Kbps.

q_itf_digInfo_facts_07

Which of the following BEST describes what a kilobyte is a measurement of? Answers:

• *Storage space


• Data throughput


• Power level


• CPU speed


Explanation:

Data storage usually refers to the number of bytes. Storage space on a disk is measured in kilobytes (KB), megabytes (MB), gigabytes (GB), and terabytes (TB).

Throughput, or data transmission from one computer to another, usually refers to the number of individual bits that can be transmitted in one second. Throughput is measured in kilobits per second (Kbps), megabits per second (Mbps), and gigabits per second (Gbps).

The base unit of measure for CPU speed is hertz (Hz) and is recorded in kilohertz (kHz), megahertz (MHz), and gigahertz (GHz). These units of measurement refer to the number of CPU cycles per second, or the number of times per second the processor can write data to memory or read data from memory.

Power & sleep options are used to regulate how much electricity a computer system consumes. They determine how long your computer can be idle before turning off the screen or putting it into a low-power sleep mode. q_itf_digInfo_facts_08

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?

Answers:

• Only 32-bit systems


• *Both 32-bit and 64-bit systems


• Only 64-bit systems


• Only 16-bit and 32-bit systems


Explanation:

An executable file with "x86" in the name was most likely created for 32-bit systems. However, since 64-bit systems are typically backwards compatible with 32-bit applications, this file will most likely run on both 32-bit and 64-bit systems. q_itf_digInfo_processing_01

Jonathan has a computer with an older PC bus interface and is getting a fiber optic connection for his home office. Which of the following BEST describes the processing speed environment?

Answers:

• The older PC bus runs at a KHz processing speed, while the fiber optic network equipment runs at a MHz processing speed.


• Both the older PC bus and the fiber optic equipment run at a MHz processing speed.


• *The older PC bus runs at a MHz processing speed, while the fiber optic network equipment runs at a GHz processing speed.


• Both the older PC bus and the fiber optic equipment run at a KHz processing speed.


Explanation:

Older PC bus interfaces run at a MHz (megahertz) processing speed. Fiber optic network equipment runs at a GHz (gigahertz) processing speed. The based unit of measurement for processing speeds is a hertz (Hz). 1 kilohertz (KHz) equals one thousand Hz, one megahertz equals one million Hz, and 1 gigahertz (GHz) equals one billion Hz.

The older PC bus runs at a MHz processing speed (not KHz) and the fiber optic network equipment runs at a GHz processing speed (not MHz).

The older PC bus and the fiber optic network equipment do not run at an equivalent MHz processing speed. The older PC bus and the fiber optic network equipment do not run at an equivalent KHz processing speed. q_itf_digInfo_processing_02

Which of the following processing speeds runs at one billion cycles per second? Answers:

• *GHz


• MHz


• GB


• MB


Explanation:

The base unit of measurement for processing speed is hertz (Hz). One hertz means one cycle per second. One gigahertz (GHz) is equal to one billion cycles per second.

One megahertz (MHz) is equal to one million cycles per second.

A gigabyte (GB) is used to measure storage space, not processing speed. A megabyte (MB) is used to measure storage space, not processing speed. q_itf_digInfo_throughput_01

Which of the following lists the throughput rates (bits per second) from slowest to fastest? Answers:

• Tbps, Gbps, Mbps, Kbps


• *Kbps, Mbps, Gbps, Tbps


• Mbps, Kbps, Tbps, Gbps


• Gbps, Kbps, Mbps, Tbps


Explanation:

Kbps, Mbps, Gbps, and Tbps are the slowest to fastest throughput rates. Kbps is 1,000 bits per second, Mbps is 1,000,000 bits per second, Gbps is 1,000,000,000 bits per second, and Tbps is 1,000,000,000,000 bits per second. Tbps, Gbps, Mbps, and Kbps represent the fastest to slowest throughput rates.

Mbps, Kbps, Tbps, and Gbps are in the wrong order and do not represent the slowest to fastest throughput rates. Gbps, Kbps, Mbps, and Tbps are in the wrong order and do not represent the slowest to fastest throughput rates. q_itf_digInfo_throughput_02

Which of the following throughput transmission units is frequently used when linking data centers, cities, and countries? Answers:

• Mbps


• Kbps


• *Tbps


• Gbps

Explanation:

Tbps (terabit per second) is equal to 1,000,000,000,000 bits per second and is often used when linking data centers, cities, and countries.

Mbps (megabits per second) is equal to 1,000,000 bits per second and is often found in home networks and wireless networks.

Kbps (kilobits per second) is equal to 1,000 bits per second and is sometimes found in slow network links or in public spaces such as a train.

Gbps (gigabits per second) is equal to 1,000,000,000 bits per second. Many modern networks and PC bus standards support Gbps.

q_itf_representation_facts_01

Which of the following encoding schemes would MOST likely be used to represent an emoji? Answers:

• *Unicode


• ASCII


• Hexadecimal


• Binary


Explanation:

Unicode is an international 16-bit encoding standard and is capable of representing millions of different characters with enough space for every character from every human language. Developers have even started assigning Unicode values to pictures, called emoji.

ASCII is short for American Standard Code for Information Interchange. It is the most common format for plain text files, where each character is represented by a unique 7-bit binary code. Extended ASCII uses an 8-bit binary code and allows for some international characters, but not emoji.

Hexadecimal is a numbering system that uses sixteen digits, 0 through 9, and A through F. Binary is a numbering system that uses two digits, 0 and 1. Binary and hexadecimal are NOT encoding schemes.

q_itf_representation_unicode

Which of the following Unicode character encoding standards is MOST commonly used for building web pages? Answers:

• *UTF-8


• UTF-16


• UTF-32


• UTF-64


Explanation:

The most commonly used encodings are UTF-8, UTF-16. For example, web pages often use UTF-8 encoding. UTF-16 is often used internally by systems such as Microsoft Windows or for word-processing data files.

UTF-32 is a way to encode binary data (such as images or sound files) for embedding into HTML, CSS, EML and other text documents.

UTF-64 is another way to embed binary data into HTML, CSS, EML and other text documents.

2.4 Media Formatting Section Introduction

As you study this section, keep the following questions in mind:

• How are pictures and sounds encoded as ones and zeros?


• Where have I seen raster images in my daily life? Where have I seen vector images?

• When is having a small file size more important than having pristine quality? When is quality important enough to justify large file sizes?


This section explains how digital media is encoded, compressed, and stored in different file formats. After finishing this section, you should be able to:

• Describe how audio and video are stored digitally.


• Distinguish between raster and vector images.


• Select the best format for digital images.


• Describe how RGB values determine pixel color.


• Compare common image file types.


• Describe the most common digital audio and video file formats.


• Describe how 3D modeling is used for computer graphics.


• Describe the difference between lossless and lossy compression algorithms.


• Discuss how sampling rate and bit depth impact the quality of digital audio.


• Discuss how file compression and image resolution impact the quality of digital images.


Key terms for this section include the following:

Term Definition


Sample

The part of a sound wave that is captured, measured, and assigned a numeric value during digital sound recording.


Bit Depth

The amount of memory used to store the numeric value of a sound sample during digital sound recording. 8-bit sound uses eight bits (or one byte) to store the value of each sample. 16-bit sound uses two bytes per sample. Generally speaking, the better the bit depth, the better the sound.


Sampling Rate

The number of individual samples taken each second during digital sound recording. Measured in Hertz, the higher the sampling rate, the better the recording. Most modern sound recordings are made at 44.1 kHz.


Frame Rate

The number of images, or frames, that are taken each second during digital video recording. Most digital videos have a frame rate of about 30 frames per second.


Resolution

The number of pixels in the width and height of each frame in a digital video recording. The higher the resolution, the clearer the image will be.

Color Depth

The amount of memory the computer uses to display colors in a digital image or a digital video. 8-bit color images use one byte of data for each pixel. 24-bit color uses three bytes for each pixel.


RGB Display

A display on a computer monitor that is made up of sets of tiny red, green, and blue (RGB) lights, each set combining to make a pixel. A pixel will display different colors depending on the brightness of each light.


Raster Images

Images stored by dividing a picture into rows of pixels and collecting the color values of each pixel, in order, row-by- row.


Vector Images

Images stored by mathematically describing the shapes in the image. A circle might be stored as a center point and the distance from the center point to the circle's edge. A square is stored as four lines, each with a beginning point and a length. More complex shapes can be stored as a set of small lines.


File Compression

A way of reducing the size of files, making them easier to store.


Lossless Compression

A compression algorithm, such as GIF, PNG, PDF, and ZIP, that doesn't affect the original data. A file compressed using a lossless compression algorithm, when decompressed, will be exactly the same as the file before compression, bit for bit.


Lossy Compression

A compression algorithm, such as JPG, MP3, and MP4, that slightly alters the data to make it easier to store, taking advantage of the limitations of human sight and hearing, and is usually used for images, videos, and audio files.


Run-Length Encoding

A common lossless compression algorithm that looks for repeated patterns of bits or bytes and records the pattern and then number of times the pattern is repeated.


Compression Artifact

A patch of pixels in a compressed image or video that have less visible detail than the rest of the image.


Bitrate

Kilobits of audio data processed each second.


Video Codecs

Pieces of software that either compress or decompress digital media.


Wireframes

The first step in designing a 3D model which provides the outline of the model, including only the vertices and lines without including any surfaces, textures, or lighting.


Rendering

The second step in designing a 3D model which converts the models into 2D images on a computer.


Ray Tracing

An advanced rendering method that is used to create incredibly realistic lighting effects for things like video games and movies.

2.4.1 Digital Sound and Video (Lesson Video) Transcript:

In the early days of recording, sound and video had to be recorded and stored using analog methods, which means they had to physically represent the images and sound waves they wanted to record. If you've ever seen a movie played from a film reel or listened to a vinyl record, you've experienced analog recording. Today, however, most sound and video are recorded digitally, which means they are encoded as ones and zeroes. Let's learn the basics of how this works.

Sound is caused when things vibrate, like a plucked guitar string. The string's vibrations cause pressure changes in the air, which creates a wave. Our ears are sensitive to these waves, and they send information about them to our brain, which interprets them as sound. Sound waves are smooth, continuous curves. Analog recording methods, like cassette tapes and vinyl records, record the smooth curve directly onto the recording media.

Modern computers don't have a way to store the analog signal directly. Instead, they convert the sound wave into digital code using binary. To do this, they divide the continuous sound wave into discrete segments, called samples, then use a binary number to store information about each sample. This sample has a height of 90, so it would be stored as the binary number for 90, which is 01011010.

One of the determiners of sound quality is bit depth, or how many bits are used to encode each sample. Early computers used eight bits, or one byte, to represent each sample. That means each sample had only 256 possible values. Today, most computers use 16-bit audio, which means each sample can be one of 65 thousand different values. This audio has a depth of four bits (guitar riff). This audio has a depth of 16 bits (guitar riff). Hear the difference?

Another setting that will influence sound quality is the sampling rate, or how many samples are taken each second. This rate is expressed in hertz. A sampling rate of one thousand samples per second is one thousand hertz, or one kilohertz. Higher sampling rates have better quality but require more storage space. This audio was recorded at 2 kHz, or two thousand samples per second (guitar riff). This audio was recorded at 44.1 kilohertz (guitar riff).

The drawback to high bit depth and sampling rates is file size. With more samples per second and more bits per sample, high-fidelity audio files can be very large.

Every video you've ever seen, including this one, is really a bunch of still images shown in fast sequence. Because our brains aren't fast enough to process each individual picture, we experience the illusion of movement, even though nothing is actually moving. For digital videos, the quality of the video is largely determined by frame rate, resolution, and color depth. Keep in mind that, just like with audio, better quality leads to larger file sizes.

Frame rate is the measure of how many images, or frames, are shown each second. The video on the right is playing at 30 frames per second. The video on the left is playing at 6 frames per second. With higher framerates, videos appear smoother and more fluid.

Resolution is determined by how many pixels are in each individual image. Digital images are made of tiny dots of color called pixels. Up close they look like colored squares, but at a distance they trick our brains into perceiving a cohesive image. Resolution is measured by counting how many pixels wide and tall each frame is. The more pixels there are, the higher the resolution and the sharper the image. Here's an example of the same video playing at two different resolutions. As you can see, the high-resolution video has a clean, sharp image, but the low-resolution video is pixelated, meaning you can see the individual pixels.

Color depth is a measure of how much memory the computer uses to display colors. Eight-bit color images use one byte of data for each pixel, which means each pixel must be one of these 256 colors. 24-bit color, which uses three bytes for each pixel, can use millions of different colors. Again, compare these two videos. The better the color depth, the more realistic the video appears.

Okay, we've learned about…hang on, I forgot to change my settings back. Just a minute…Okay, much better. We've just learned about digital audio and video. Digital audio is created by dividing each wave into samples, then recording the value of each sample. Digital videos show lots of digital images in quick succession. We also learned about factors that contribute to audio and video quality. For audio, we discussed bit depth and sampling rate. For video, we looked at frame rate, resolution, and color depth. With both audio and video files, higher quality results in larger file sizes.

2.4.2 Digital Sound and Video Facts

2.4.3 File Compression (Lesson Video) Transcript:

We create and transmit more files today than we have at any point in our history. Video cameras used to be bulky and expensive, but today most people carry one with them everywhere they go. Anyone who has a smartphone can create

picture, video, and audio files, and transmit them over the Internet. These files take up storage space, which is limited and expensive. Fortunately, we can compress files to make them smaller. Compression is reencoding a file in a way that uses fewer bits than the original, but keeps most or all of the information intact. Since smaller files take less space and transmit more quickly, this is a huge advantage. Let's look at a few examples of how compression works.

This is a twelve-pixel image of the German flag. It has a resolution of 4x3 pixels. The color of each pixel is determined by three color values: red, green, and blue. Each color value is encoded using one byte of data, which means each pixel takes three bytes to store. So, this image file will consume 36 bytes of storage space. Let's see how we can use compression to store this file more efficiently.

One way to compress data is called Run-Length Encoding. This algorithm takes advantage of the fact that many images use the same pixel color multiple times in a row. For example, the image starts with four black pixels. Instead of storing each individual pixel, the computer could store the number four, then the three bytes for the color black. The red and yellow pixels could be stored the same way – the number of pixels, then the color value. Using this algorithm, this image would consume only 12 bytes of storage space – one third of the original.

Algorithms like Run-Length Encoding are called lossless compression techniques because they don't lose any information. The decompressed file is identical, bit for bit, to the original uncompressed file. GIFs, PNGs, PDFs, and ZIP files all use lossless compression.

There are other compression techniques that change the original file a little bit. These techniques are called lossy compression and are most commonly used for image, video, and audio files. Lossy compression takes advantage of the fact that human sight and hearing are imperfect and can't detect small losses in the data.

Here is an uncompressed photograph. Let's zoom into the top-left corner so we can see the individual pixels. As you can see, each pixel is a little bit different from the others, so using run-length encoding wouldn't work well here. However, the computer can change the pixels just a little bit to make them more similar. Here is the same square of pixels after compression. Now, the computer can store this file using much less space. Of course, if the computer simplifies an image too much there will be a noticeable drop in quality. However, by making small adjustments, the file size can drop significantly without any visible differences. The picture on the left is a 12 MB file, and the image on the right is 2 MB. For images, the most common lossy file type is the jpeg.

Videos, as you know, are really just rapid sequences of still images, called frames. This means they can use the same compression techniques we've just looked at. However, they can take things a step further because most videos have some pixels that stay the same from frame to frame. For example, this background doesn't change at all between frames. This is called temporal redundancy. Instead of retransmitting these pixels for each individual frame, the compression algorithm copies them forward. Without this kind of compression, it would be nearly impossible to stream videos over the internet, since it would take too long to transmit all the information.

Of course, if the video is heavily compressed, the computer may retransmit patches of data that should have been changed, which can cause funny-looking areas called compression artifacts. If you're watching a movie or TV show, compression artifacts can get in the way of the experience. However, many instructional videos, including the ones in this course, are heavily compressed and have a few artifacts. This is to make the video files as small as possible, which makes them watchable even on slow Internet connections. The most common file type for compressed videos is the MP4.

Just like image compression, audio compression takes advantage of the limitations of human hearing. For example, our ears are very sensitive to sound frequencies in the vocal range, such as talking and singing. However, some frequencies are much too high for us to hear. Most audio compression techniques discard data in the ultrasonic range, since we can't hear it anyway, but preserve data in the vocal range. Some compression techniques go even further and compress even the vocal range. This is why voices sound different when you talk on the phone – the audio is compressed so more people can use the telephone service at the same time. The most common file type for compressed audio is the MP3.

MP3s are as much as ten times smaller than uncompressed audio files.

In this video, we learned about compression, which reduces the size of computer files. Lossless compression shrinks files without changing the data. Lossy compression removes or changes data that is difficult for humans to perceive.

Compressed files consume less storage space and transmit much more quickly than uncompressed files. Without file compression, online videos such as this one would be nearly impossible to view.

2.4.4 File Compression Facts

In today's tech-rich world, more files are created and transmitted than at any previous point in our history. Because of this, storage space and bandwidth are a constant concern. Compression is a way of reducing the size of files, making them easier to store. The table below describes some terms related to file compression.

Table 1: File Compression Terms and Definitions

TERM DEFINITION


Lossless Compression

A compression algorithm that doesn't affect the original data. In other words, the uncompressed file will be exactly the same as the file before compression, bit for bit. Common lossless file types include:

• GIF


• PNG


• PDF


• ZIP


Lossy Compression

A compression algorithm that slightly alters the data to make it easier to store. Lossy compression takes advantage of the limitations of human sight and hearing, and is usually used for images, videos, and audio files. Common lossy file types include:

• JPG


• MP3


• MP4


Run-Length Encoding

A common lossless compression algorithm. Instead of storing each individual bit of a file, it stores how many of each bit appears in a sequence. For example, instead of storing thirty zeros in a row, it would just store the number thirty, followed by a zero. It can also store repeated patterns in data, such as identical pixels in an image.


Compression Artifact

Sometimes, when a video is compressed to a very small size, patches of pixels appear that have less visible detail than the rest of the image. These are called compression artifacts. They often appear in educational videos (such as the ones in this course) because file size is prioritized over video sharpness, which allows the videos to stream well on suboptimal hardware.


2.4.5 Digital Audio Formats


Woman listening to audio on a wired headphone set. Photo by Daniela Mota on Unsplash

Bitrate

Modern computing devices support a wide variety of audio file formats such as MP3, WMA, WAV, and MIDI. Before you choose which format is best for your audio, you first need to understand the concept of bitrate. Bitrate refers to the kilobits of audio data processed each second. Some lossy compression algorithms reduce the bitrate, which removes audio data and reduces sound quality in exchange for a smaller file size. If the bitrate is higher, this results in a larger file size but better audio quality. This lesson will help you understand the different types of file formats and what type of

compression is used with each. WAV/AIFF

Waveform Audio Files (WAV) are one of the most popular audio formats. WAV was created in 1991 by Microsoft and IBM to be used with Windows 3.1. Apple created its own version of this format in 1988 called Audio Interchange File Format (AIFF). Despite being older formats, they're preferred by professional users due to the ease of editing and sound quality. Since this data is uncompressed, these files can take up a lot of space and are not ideal for mobile devices such as phones or tablets. WAV files are typically used for TV, radio, and other media that requires quality uncompressed audio.

MP3/AAC

MP3 Player


MP3 Player.

MP3 is an acronym for MPEG Layer 3 and is a format that uses lossy data compression to reduce file size. It was developed in Europe by an international collaboration of engineers called the Moving Pictures Experts Group (MPEG) that was founded in 1988. Their goal was to create an audio compression tool that could shrink the file without affecting the quality of the audio. They achieved this using auditory masking, which uses one sound to render another sound inaudible. After that, the remaining audio information is then recorded in a space-effective manner, reducing the file size by 75%-95%. In November of 1996, this technology was patented as MP3, MPEG-1, or MPEG-2 Audio Layer 3. The creation of the MP3 format created a digital music frenzy in the mid-1990s due to the high-quality sound reproduction and the ability to store many MP3s in one place. In 1997, a similar format was developed called Advanced Audio Coding (AAC) that uses similar but more complex compression algorithms that allow for better sound quality than an MP3. This format is used by YouTube, Android, iOS, iTunes, and various gaming systems because of its small file size and excellent sound quality.

WMA

A Windows Media Audio (WMA) file is a lossy audio file format. It was first released in 1999 by Microsoft to be used with their Windows Media Player and to avoid the licensing issues associated with the MP3 format. Like the MP3 format, it compresses audio in a way that leads to a reduction in file size but maintains a higher level of quality at a lower bitrate. Since WMA is a Microsoft-based audio file, it isn't used as freely as MP3 and is often converted to another more widely used format.

MIDI

Unlike an MP3 or WAV, Musical Instrument Digital Interface (MIDI) files don't contain actual audio waves. MIDI is a standard protocol that was created in the late 1980s as way to standardize the exchange of musical information between musical instruments. MIDI files consists of three different components. The first component is the physical connector that connects and transports data between devices. The second is the message format that controls the stored data and connected devices. Lastly, the storage format stores all the data and information. MIDI files are often used with synthesizers and keyboards but can be used with computers and other electronic instruments as well. A MIDI file translates instructions of which notes are to

be played, when they are to be played, and how long they are to be held and reproduced. MIDI files have become popular among musicians because they can easily be modified by editing or removing instructions such as pitch or tempo.


An electronic keyboard instrument. Photo by Ricardo Abreu on Unsplash

2.4.6 Digital Video Formats


Man watching video from a portable computer tablet. Photo by Parker Byrd on Unsplash

Video files are an important part of modern computing. They allow users to upload video content to social media and to video hosting sites like YouTube. But not all video files are exactly alike. It's important to consider that video files can take up a great deal of space, which can be especially problematic if you're trying to share it on the internet. To help mitigate this problem, software developers created video codecs that help compress video data into smaller packages that can be stored and unpacked later.

Video Codecs

Before the creation of codecs, video files were so large that only the most powerful computers could run them. Codecs

were created to make video files more accessible. A codec is a piece of software that either compresses or decompresses digital media.

Most codecs have two main components: an encoder that compresses information and a decoder that decompresses it. There are some codecs, however, that contain only one or the other. When you save a video file to your computer, the encoder compresses information so that it can be saved in a smaller file size. When you click on that video to play it, the decoder decompresses the information so that it can be viewed on your screen. The following diagram shows how this process works.

Compression/Decompression Diagram


A diagram of the process of compression and decompression of audio and video files. The following are examples of common codecs that are used for videos:

MPEG-4

MPEG stands for Motion Picture Experts Group and MPEG-4 is one of the most common and widely used codecs. MPEG-4 has gone through several iterations, including MPEG-1 and MPEG-2. The MPEG-4 codec is the newest version. It uses an advanced compression algorithm that can compress a standard 120-minute film into 300MB. DivX

DivX is a movie encoding codec that's used on many DVD movies by utilizing a certain type of MPEG-4 file. It's used to compress an entire movie so that it can fit on a single DVD. There's also an HD version called DivX HD which can compress a high-definition movie onto a single DVD as well.

Video File Formats

Just like digital images, digital videos have their own file formats that tell you things about the kind of file that they are. Each of these has its own file extension as well that comes after the period at the end of the file name, such as .mp4 and

.mov (also stylized as MP4 and MOV).

One of the most important distinctions to make is that some formats are compressed while others are not. Compressed files take up less memory space but lose some of their quality. Uncompressed files take up more memory space but retain more of their quality.

The following are common video file formats that you'll probably encounter when working with digital videos: MP4

Similar to an MP3 format for audio files, an MP4 file is a compressed video format. The full name of this extension is MPEG-4. It's a very common format for internet videos because it takes up much less space than many other videos types. This format is also able to store audio, subtitles, and still images included in the video itself. This file format is so common, in fact, that almost all video players are preconfigured to play these files, including those on most smartphones, PCs, and Macs.

AVI

AVI (.avi) stands for Audio Video Interleave. This format was initially created by Microsoft in 1992 as a multimedia container for their Video for Windows software program. AVI contains both audio and video data, and it allows them to be played together. This format is made up of small container files called RIFF files (Resource Interchange File Format files) that divide each AVI file's data into smaller chunks. Each file has one chunk that includes metadata about the file (such as the dimensions and frame rate), and a second chunk that includes the actual audio and visual data for the video. AVI files are not compressed and can become very large. They only run natively on Windows computers and are not as feature-filled and versatile as more modern formats like MP4.

MOV

MOV is a compressed file format that was developed for Mac and meant to function like an MP4 file. It contains a variety of tracks which can include things like video, audio, text, and timecodes. It functions in a similar way to MP4 files as both can be played by the common movie player QuickTime. MP4 is seen as a more standardized format and enjoys more support than MOV does. One advantage to this type of file, however, is that it's much easier to edit.

MOV files can also be played on computers running Windows. However, this does require a specific kind of media player (most commonly VLC Media Player) as they cannot be run natively by the software that comes with Windows. WMV

WMV (.wmv) is a video format that was developed by Microsoft and based on its Microsoft Advanced Systems Format (ASF). It's a type of compressed file that's encoded with Microsoft's proprietary codecs and is commonly used for storing videos on Windows. You have to download additional software to play these files on a Mac.

2.4.7 Digital Images (Lesson Video) Transcript:

One of the most amazing developments in computer technology is the ability to create and display high-quality images. Before computers, photographers shot pictures onto film, which had to be developed in a laboratory before the pictures could be printed on paper. Now, anyone with a smartphone can take a photograph and instantly share it with someone on the other side of the planet. In this video, we're going to look at how computers display images, and talk about the two types of digital graphics – raster and vector.

From a distance, this may look like a white screen. But if you look it with a magnifying glass, you'll see that it's made up of tiny red, green, and blue lights. This is called an RGB display. Red, green, and blue are the three primary colors of light, and they can be combined to make all the colors of the visible spectrum. Each set of three lights is called a pixel.

Let's use these three lights to represent a single pixel. When all three lights shine at the same time, our eyes perceive them together as white light. By combining two colors, you get the secondary colors of light. Red and green make yellow, red and blue make magenta, and green and blue make cyan. By varying the brightness of one or more of the lights, each pixel can display any color on the visible spectrum.

Now that we've seen how computers display images, let's look at two ways computers can store images – raster and vector. Raster (or bitmap) images are the most common. Computers store raster images by remembering the color of each pixel. For example, a yellow pixel might take three bytes to encode – one each for red, green, and blue. Since yellow is a combination of red and green, the computer might store the yellow pixel by using eight ones for red, eight ones for green, and eight zeroes for blue. When the computer interprets this data, it turns the red and green lights all the way on, and the blue light all the way off.

Raster images have several advantages. Because they store each individual pixel, they can be very detailed. Digital photographs, for example, are raster images. Raster files are also easy to create. If you have a camera on your phone, you can create a raster image in just a few seconds. All that detail comes at a cost, though, because raster images use tons of storage space. They also have limits to how much you can scale the file. If you take a small raster image and make it larger, it'll become pixelated, which means you can see the individual pixels.

Vector graphics are the other kind of digital image. If you've ever seen a 3D computer-animated movie or video game, then you've seen vector graphics at work. Fonts are also vectors.

Instead of storing each individual pixel, the computer stores points and curves. For example, to create a circle, a vector image may store these four points, then tell the computer to connect the points with quarter arcs and fill the shape with a color.

One of the main advantages of vector images is that they're scalable. That means you can increase and decrease the size of the image without losing any image quality. Vectors are often used to create logos, because the same file can be shrunk to fit on a business card and stretched to fit on a billboard. Another advantage is that vector files generally take up less storage space than raster files.

That said, vector images also have some disadvantages. For one, they're difficult to create. Anyone with a camera can take raster photographs, but vectors require special software and training. Also, vector graphics usually lack the fine detail of raster images, which is why they're usually used for images with only a few colors.

In this video, we learned how computer displays use tiny red, green, and blue lights to create colors. We also learned about raster and vector images. Raster images store the color value of each individual pixel and are great for photorealistic detail. Vector images are infinitely scalable and are useful for fonts and logos.

2.4.8 Digital Image Facts

One of the most amazing developments in computer technology is the ability to create and display high-quality images. Before computers, photographers shot pictures onto film, which had to be developed in a laboratory before the pictures could be printed on paper. Now, anyone with a smartphone can take a photograph and instantly share it with someone on the other side of the planet.

Image 1: RGB Colors


A visual represenation of how RGB colors are combined to create other colors. Table 1: Digital Images

FEATURES/TERMS DESCRIPTION


1. RGB Display

Computer monitors are made up of tiny red, green, and blue lights. This is called an RGB display. Red, green, and blue are the three primary colors of light, and they can be combined to make all the colors of the visible spectrum. Each set of

three lights is called a pixel. The image above uses three lights to represent a single pixel. When all three lights shine at the same time, our eyes perceive them together as white light. By combining two colors, you get the secondary colors of light. Red and green make yellow, red and blue make magenta, and green and blue make cyan. By varying the brightness of one or more of the lights, each pixel can display any color on the visible spectrum.


2. Raster Images

Raster (or bitmap) images are the most common kind of digital image. Computers store raster images by remembering the color of each pixel. For example, a yellow pixel might take three bytes to encode – one each for red, green, and blue. Since yellow is a combination of red and green, the computer might store the yellow pixel by using eight 1s for red, eight 1s for green, and eight 0s for blue. When the computer interprets this data, it turns the red and green lights all the way on, and the blue light all the way off.

Raster images have several advantages. Because they store each individual pixel, they can be very detailed. Digital photographs, for example, are raster images. Raster files are also easy to create. If you have a camera on your phone, you can create a raster image in just a few seconds. All that detail comes at a cost, though, because raster images use tons of storage space. They also have limits to how much you can scale the file. If you take a small raster image and make it larger, it’ll become pixelated, which means you can see the individual pixels.


3. Vector Images

The other kind of digital image are vector graphics. If you’ve ever seen a 3D computer-animated movie or video game, then you’ve seen vector graphics at work. Fonts are also vectors. Instead of storing each individual pixel, the computer stores points and curves. For example, to create a circle, a vector image may store four points, then tell the computer to connect the points with quarter arcs and fill the shape with a color.

One of the main advantages of vector images is that they’re scalable. That means you can increase and decrease the size of the image without losing any image quality. Vectors are often used to create logos, because the same file can be shrunk to fit on a business card and stretched to fit on a billboard. Another advantage is that vector files generally take up less storage space than raster files.

That said, vector images also have some disadvantages. For one, they’re difficult to create. Anyone with a camera can take raster photographs, but vectors require special software and training. Also, vector graphics usually lack the fine detail of raster images, which is why they’re usually used for images with only a few colors.


2.4.9 Digital Image Formats

Image files have become commonplace in all kinds of computers and devices. That said, not all image files are the same. Generally, image files take up much more space than things like document and spreadsheets files, and different image file formats take up different amounts of storage space as well, depending on the quality. Some formats are better for sharing on social media, while others are better for websites or print. Knowing about image file formats will help you decide which one is best for your needs.

Image File Formats

.jpg

JPEG stands for Joint Photographic Experts Group and is one of the most common image file extensions. You may see it written .jpg or .jpeg. The reason for this goes back to earlier days when there was a discrepancy between Mac and Windows file extension naming conventions. Windows only allowed for three-letter extension names, while Apple computers weren't restricted in this way. Though this limit was eventually lifted on Windows, JPG is still how most users refer to the format.

JPG Format Example


Sunset at sea with large rocks near the shore.

JPG is a compressed file type that drastically reduces the file's size by a ratio of 20:1 without sacrificing too much image quality (though it is still a lossy format). It supports 24-bit color which can create a wide variety of shades. This balance makes it a popular format to use on the internet for things like posting to social media and displaying pictures on mobile devices. These types of files are easy to share and can be opened by a wide variety of software both on PCs and Macs.

.png

Portable Network Graphics, or PNG, is a raster file format that supports lossless compression of image files. PNG (.png) was released in 1994 to be an improvement on the GIF file format, and it combined many features of both GIF and JPG formats (like JPG, it can support 24-bit color). PNG was meant to create files that could be shared on the internet or used in applications - it was not intended for use in print media.

PNG Format Example


TestOut logo.

One feature that PNG files have that JPG files don't is something called an alpha channel, which facilitates different levels of transparency within an image. This allows PNG files to have transparent backgrounds, making them preferable for web design. PNG files, however, cannot be animated like GIF files.

.gif

GIF, or Graphics Interchange Format, was originally released in 1987 by CompuServ. Pronounced either with a hard G ("gif") or a soft G ("jif"), GIF is a lossless format that's often used for web images. Because it stores image data using indexed color, the range is limited to 256 colors. This is in contrast to other file formats that have millions of colors to draw from, meaning that images won't have as much nuance as other file formats. This also means that it's not the ideal format to store and share digital photos because the limited color palette will cause the photos to look grainy and unclear. The limited palette is instead ideal for icons and buttons on the web because they don't require thousands of colors to look good.

Today, the GIF format is most widely used to show animations. GIFs can store multiple images in a single file, then display them one after another like a video on an endless loop.

Animated GIF Example


Man dancing comically on stage.

.tiff

TIFF stands for Tagged Image File Format. TIFF is a format for storing raster graphics that was created in 1986 to be a standard image format that could be shared across a variety of computer programs. Several corporations worked on its development, including the Aldus Corporation (which became part of Adobe) as well as Microsoft and Hewlett-Packard. Unlike many other image formats, TIFF is not compressed at all. This makes it an ideal format for high-quality printing. However, modern web browsers don't support the format without special plugins, which is why we haven't included an example here.

2.4.10 3D Models

3D graphics are important to a variety of fields. Animators use them to create movies and video games, analysts use them to create graphic representations, and manufacturers create 3D models of their new products before they ever hit the assembly line. 3D printers can even turn 3D graphics into three-dimensional solid objects.

All 3D graphics are based on vectors, meaning they can be scaled to any size without becoming pixelated. They're created using a multi-step process that consists of wireframing, rendering, and ray tracing.

Wireframes Wireframe Model


A 3D model of a car.

The first step in designing a 3D model is known as wireframing. This provides the outline of the model, including only the vertices and lines without including any surfaces, textures, or lighting. It gives you just the general shape of the object you want to create.

These "wires" act as the skeleton of the 3D model you're looking to build. Designers can create this model simply by creating a series of points (also known as vertices) and connecting them with lines (also known as paths). These lines connect together to create three-dimensional polygons.

Wireframes can be very simple, such as cubes or pyramids, or can be used to create complex scenes made up of a variety of different polygons joined together. As a general rule, the more polygons a wireframe model contains, the more complex the finished product will be.

One reason animators use wireframe models is that they're simple enough to render quickly on a screen, especially if the computer isn't as powerful. This makes them much easier to manipulate and edit than a model that's more complex. More powerful computers can be used to render more complex shapes.

Rendering

3D rendering of Streptococcus Pneumoniae bacteria.


A 3D rendering of <i>Streptococcus Pneumoniae</i> bacteria. Photo by CDC

The next step is called rendering. This process consists of converting 3D models into 2D images on a computer. This can be done for a still image or for an animated video. It's similar to photography and cinematography because you're using lighting and staging scenes to produce a particular effect. Everything in your scene, however, has to be created as a model within your computer before it can be rendered and used. This requires a great deal of work for more complex scenes, but at the same time it allows you a lot more creative control of the work in progress.

The rendering process often adds a variety of visual effects to the object including lighting and shadow, color-shading effects, texture effects, and visual effects such as motion blur.

Depending on the complexity of the image or scene and the processing power of the computer, the rendering process can take a long time. For this reason it's important to make sure you have everything the way you want it before beginning the final rendering process.

Ray Tracing

Ray tracing is an advanced rendering method that is used to create incredibly realistic lighting effects for things like video games and movies. It can even be used in live-action films or television shows to blend computer-generated objects in with real ones in a way that makes it difficult to tell the difference.

It works by simulating and tracking every single ray of light produced by a light source within the scene, whether natural or artificial. The computer is able to render realistic light and shadow effects on virtual objects in real time. These kinds of rendering calculations are incredibly complex and require advanced hardware to effectively achieve the end result.

2.4.11 Activity: Compare Digital Media

In this activity, you will compare and contrast media files with different settings. Write a short paragraph on each of the following topics.

1. Explain the concepts of sampling and sampling rate. Then, listen to this 2 kHz file , this 8kHz file , and this 44.1 kHz file and compare their sound. Depending on your speakers, you may not notice any difference.


2. Explain the concept of compression and the difference between lossy and lossless compression. Then, compare this 601 kB file and this 33.7 kB file . Was lossy or lossless compression used? How did compression affect the image?


3. Explain the concept of bit depth in audio recordings. Then, listen to this 8-bit recording and this 32-bit recording and compare their quality.


4. Describe the difference between raster and vector images. Then, compare this raster image and this vector image . In both images, the bottom TestOut logo is an enlarged version of the top logo.


5. Describe the concept of image resolution. Then, compare this 94 x 140 image and this 604 x 900 image .


2.4.12 Section Quiz (Section Quiz) q_itf2_digSound_01

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is that value called?

Answers:

• Bit depth


• Sampling rate


• *Sample height


• Resolution


Explanation:

Sound is caused by vibrating objects which create pressure waves in the air. Digital sound recordings capture this continuous wave and divide it into distinct segments. The recording then assigns a value to each segment. A single segment's value is called its sample height.

Recording programs must decide how much memory they should allocate to store the value of each sample. The amount of memory used is called the bit depth.

The sampling rate is how many individual samples are taken each second. This is measured in hertz (Hz). Resolution is the measure of how many pixels wide and tall each frame of a digital video is. q_itf2_digSound_02

How many possible values would an 8-bit audio sample have? Answers:

• 16


• *256


• 65,000


• 256,000


Explanation:

Bit depth is the amount of memory used to store each value of a sample. The better the bit depth, the better the sound quality. 8-bit sound uses 8 bits (or 1 byte) to store the value of each sample, which means the sample can be 1 of 256 values.

None of the other options are possible values of an 8-bit sample. q_itf2_digSound_03

Which of the following makes videos appear smoother and more fluid? Answers:

• Lower frame rate


• Lower resolution


• *Higher frame rate


• Higher resolution


Explanation:

The frame rate is the measure of how many images, or frames, are shown each second. A higher frame rate makes videos appear smoother and more fluid than a lower frame rate.

Resolution is the measure of how many pixels wide and tall each frame of a digital video is. The higher the resolution, the clearer the image will be.

q_itf2_digsound_resolution_01

You have just built a brand new computer, and you need to purchase a monitor that will support widescreen 4K movies. Which of the following resolutions supports this need?

Answers:

• 1600 x 900


• 1920 x 1080


• 1920 x 1200


• *3840 x 2160

Explanation:

3840 x 2160 is the resolution that supports widescreen 4K movies.

1600 x 900 is a high-definition (900p) resolution that is popular in laptops. It does not support 4K resolution. 1920 x 1080 is a high-definition (1080p) resolution that a 16:9 aspect ratio, but does not support 4K resolution. 1920 x 1200 is a high-definition resolution that supports a 16:10 aspect ratio, but does not support 4K resolution. q_itf2_digsound_resolution_02

Which of the following video standards provided resolutions up to 1024x768, color depths up to 32 bits, and higher refresh rates when it was released?

Answers:

• VGA


• SVGA


• *XGA


• HDMI


Explanation:

The XGA standard provided resolutions up to 1024x768, color depths up to 32-bits, and higher refresh rates when it was released. Most modern display systems use a variation of the XGA standard today.

VGA specified a resolution of 640x480 with 16 colors at 60Hz.

SVGA specified a resolution of 800x600 with either a 4-bit or 8-bit color depth at at 60 Hz. HDMI is a connector used for high-definition displays. It is not a video standard. q_itf_digSound_video_facts_01

Match each feature to whether it influences audio or video quality. Answers:

• Frame Rate


• Color Depth


• Bit Depth


• Resolution


• Sampling Rate


Explanation:

Sampling rate is a measure of how many samples are made from an audio wave each second. Bit depth is how many bits are used to encode each individual sample in an audio recording. Frame rate is the measure of how many individual images are shown each second in a video. Resolution is the measure of how many pixels are in each individual image in a picture or video. Color depth is a measure of how many bits are used to encode each color in a picture or video. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf2_compression_01

Which of the following is a lossless compression algorithm? Answers:

• *Run-length encoding


• Compression artifact


• MP4


Explanation:

Run-length encoding is a common lossless compression algorithm.

A compression artifact is when patches of pixels appear to have less visible detail due to the compression. MP4 is a type of audio file.

PNG is a type of image file. q_itf2_compression_02

What are pixels that are the exact same between multiple frames called? Answers:

• Run-length encoding


• Compression artifact


• Lossless compression


• *Temporal redundancy


Explanation:

Temporal redundancy is when pixels in multiple frames are the exact same. Reusing these pixels is a common compression technique.

Run-length encoding is a common lossless compression algorithm.

A compression artifact is when patches of pixels appear to have less visible detail due to the compression. Lossless compression is a compression algorithm that doesn't affect the original data. q_itf_compression_facts_01

Which kind of file would be hurt most by a lossy compression algorithm? Answers:

• *A text document


• An audio file containing music


• An audio file containing speech


• A digital photograph


Explanation:

Audio and image files use lossy compression to take advantage of the limitations of human sight and hearing. However, text files and computer programs need to be stored with no data loss, or they will be corrupted. They are usually compressed using lossless algorithms, which compress the file without altering any of the data.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf2_digImages_01

A typical computer monitor is which type of display? Answers:

• *RGB


• Raster


• Vector


Explanation:

Computer monitors are made up of tiny red, green, and blue lights. This is called an RGB display. Raster (or bitmap) images are the most common kind of digital image.

Vector graphics are another type of image that stores points and curves instead of storing pixels.

White is not a type of computer display. White is displayed on a computer screen when all three RGB colors shine at the same time.

q_itf_digImages_facts_01

Which type of digital picture is made by storing individual pixel values? Answers:

• *Raster


• Vector


• High-res


• Pixel map


Explanation:

Raster images, such as digital photographs, store the color value of each individual pixel. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1. q_itf_digImages_facts_02

Which type of digital picture can be scaled to any size without losing quality? Answers:

• *Vector


• Raster


• High-res


• Transparent


Explanation:

Vector images, such as fonts, can be scaled to any size without losing image quality. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.1.

2.5 Digital Media Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of digital media professionals affect my daily life?


• How can I prepare for a career in digital media?


This section describes common careers in digital media creation. After finishing this section, you should be able to:

• Describe common careers in digital media, including video production, graphic design, and digital audio production.


• Identify skills and educational requirements for digital media careers.

Key terms for this section include the following:

Term Definition


Video Production Specialist

An IT professional who designs, records, and edits instructional videos, marketing materials, commercials, and other digital video content.


Graphic Designer

A creative artist who designs digital images and illustrations for a wide variety of purposes, including ads, logos, emails, marketing materials, websites, social media, and mobile apps.


Digital Audio Producer

An IT professional who specializes in recording and editing high-quality audio for videos, podcasts, and many other purposes.


2.5.1 Careers in Digital Media (Lesson Video) Transcript:

Digital platforms such as video games, social media, and online education continue to expand at a phenomenal rate. Of course many people still read printed books and magazines. But photographs, illustrations, and videos are increasingly created and viewed in digital formats. In this video, we'll take a brief look at three careers in digital media: graphic designer, video production specialist, and digital audio producer.

Have you ever seen an amazing poster and wondered who had the creativity to create such inspiring material? It was likely crafted by a graphic designer. These creative individuals design images and illustrations for almost anything a company could ask for, including ads, logos, emails, marketing material, websites, social media, and mobile apps.

Graphic designers have refined skills in integrating color, typography, images, and layout. Many designers are also skilled in front-end coding, photography, and the ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator.

Video production specialists are instrumental in the success of many companies today. They create instructional videos, marketing material, commercials, and much more. It's important that video production specialists have the expertise to recommend effective media communication practices and explain video design principles to clients and employers.

Many video production specialists receive at least a bachelor's degree in telecommunication or video production. When creating a video or podcast, a digital audio producer makes the audio sound polished and ready for their client.

They specialize in recording and editing high-quality audio. Digital audio producers must have extensive knowledge of audio equipment and use the right setup for a variety of circumstances. For example, recording audio in a studio requires different tools than recording audio outside. Since there's a lot of overlap with video production, most audio producers have those skills as well.

In this video we discussed careers in the digital media field. We looked specifically at graphic designers, video production specialists, and digital audio producers. While skills for these jobs can be attained through self-instruction or experience, it's always recommended to receive some type of formal education to be competitive in the workforce.

2.5.2 Digital Media Career Facts

Digital media professionals design and produce images, video, audio, and other digital resources. While these skills can be obtained through on-the-job experience, some type of formal education is always recommended to make you more competitive in the job market. In addition to doing freelance work in content production, digital media professionals are often employed by businesses as marketing specialists, art directors, videographers, and web designers. This lesson overviews a few common digital media careers.

Table 1: Digital Media Careers Job Title

Description

Graphic Designer

Graphic designers are creative individuals who design images and illustrations for a wide variety of purposes, including ads, logos, emails, marketing material, websites, social media, and mobile apps. They have refined skills in integrating color, typography, images, and layout. Many designers are also skilled in front-end coding, photography, and the ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator.


Video Production Specialist

Video production specialists are instrumental in the success of many companies today. They create instructional videos, marketing material, commercials, and much more. It's important that video production specialists have the expertise to recommend effective media communication practices and explain video design principles to clients and employers.

Many video production specialists receive a bachelor's degree in telecommunication or video production.


Digital Audio Producer

Digital audio producers specialize in recording and editing high-quality audio for videos, podcasts, and many other purposes. They have extensive knowledge of setting up audio recording and editing equipment in a variety of different scenarios. For example, recording audio in a studio requires different tools than recording audio outdoors. Since there's a lot of overlap with video production, most audio producers have those skills as well.


2.5.3 Interview: Video Production Specialist (Lesson Video) Transcript:

I did like literally 10 minutes of like just improv, doing all this stuff, and then they're like "Andrew, it's not recording." Crap.

You know what I love about being involved in video production is, you just get to work with a lot of cool people. Like you work get work with a lot creatives and one of my favorite things is like collaboration, how you can take an idea that's maybe sometimes just thrown in there, or like a random, or just everyone's talking and you know you get the right minds in group together. You can turn that idea into something awesome.

So I started doing like just short films on the side. I'd just buy cheap gear and my buddies and I would get together and start shooting stuff. Of course, someone always has to edit it, so then I started editing everything, and you kinda learn the process of all the stuff that goes into production. You kinda have to break your day up a little bit because you can't always be creative; there's a technical side that has to happen.

You really have to know a lot of programs. Nowadays you'll see on resumes it's nuts. You need to know Illustrator, PhotoShop, Premier, Logic, DaVinci, there's like so many things. Computers are a huge part of what video production is nowadays, whether it be digital, audio, it all comes from the computer. So you really need to know codecs, you really need to know file formats. In fact, most cameras have their own codecs that, you know, has to translate into your editor. So it really helps to know your way around a system. Especially as a video editor, I would say. Like, so much of it is connected now to technology. Like, how would we even edit? We wouldn't! We edit on our phones now. You edit on your phone.

If you want to get into a job, corporate environment, you definitely probably should go to college. Get a degree; they like those. It's changing a little bit, but you have so much competition. A lot of it is your portfolio, your reel. And if you have a really good reel, you're probably in. The one thing I've always said is you gotta start doing it. Just do it and then you'll learn from it.

I got fired from MMA fights. I think I scavenged together, like, three or four cameras, and they wanted three people filming, like, in the octagon of the fights. I don't know, I was young, I was new, so I was like "I can do this. I can do this job." And then I hired my friends who had like no experience in video production. They were like my comedy buddies. We were like up all on this, up on the chain-link fences filming and everything. And I was like "this is gonna be great!" And then I got all the footage together and the footage was horrible. The things you fail at you just remember, you get better at. Image stabilization would be one of them.

If you're looking to get into video production I would definitely find something that you love to do, and that might branch off to other things because there's so much you can do in the industry. But find one thing that you really like, that you can put your effort into, like color correction or editing or audio. Find something, because you might expand from there once you get there, but find something you can really, you really enjoy. And then just learn everything you can about it.

2.5.4 Section Quiz (Section Quiz)

3.0 Computer Hardware

3.1 Chapter Introduction


A group of people examining large scale versions of computer hardware such as processor chips, motherboards, and others. Illustration.

Computer Hardware

This chapter describes the purpose of computer hardware, including internal components such as the processor, memory, motherboard, input and output devices, and storage. Using hardware simulators, students practice installing and troubleshooting various system components. The chapter concludes with a brief look at common careers in computer hardware.

After finishing this chapter, you should be able to:

• Compare and contrast the features of various computing devices.


• Identify, install, and troubleshoot internal hardware components.


• Identify, install, and troubleshoot input and output devices.


• Identify, install, and troubleshoot storage devices.


• Identify common careers in computer hardware.


3.2 Computing Devices Section Introduction

As you study this section, keep the following questions in mind:

• How are desktops, laptops, and mobile devices similar? How are they different?


• What kinds of tasks are best done on each kind of device?


After finishing this section, you should be able to:

• Compare and contrast the features of various computing devices, including cost, screen size, computing power, portability, storage capacity, cases and form factors, and digital cameras.


• Recommend computing devices based on user requirements.


Key terms for this section include the following:

Term Definition


Desktop

A popular type of computer system that can be equipped with peripheral devices such as a monitor, keyboard, mouse, and speakers.


Notebook/Laptop

A small computer that combines a display and keyboard and is designed to be easily carried.


Mobile Device

Small computing devices such as tablets and smart phones that are much more portable than desktops and laptops.

3.2.1 Computing Devices (Lesson Video) Transcript:

Every single computing device, whether it is a desktop, notebook, tablet, or phone, is composed of two general components: the hardware and the software.

Hardware comprises the physical components of a device. All the parts you can see, like screens, keyboards, wires, and chips, are hardware. By itself, hardware can't do very much. In order to work, it needs software, which is a set of instructions that tell the hardware what to do. Operating systems and applications are examples of software. The way the hardware and software is implemented can vary between different types of computing devices.

We're going to look at three general categories: desktop computers, notebook computers, and mobile devices. Desktop computers have been around for years and are very widely used, especially in business and industry. Desktop computers are typically composed of the computer itself and peripheral devices, which typically include a monitor, a keyboard, a mouse, speakers, and video cameras.

Desktop systems have many advantages over other types of computing devices. They are modular in nature, meaning you can combine different pieces together to customize the system to do exactly what you want it to do. They are easy to repair and upgrade. They tend to be much more powerful than other types of computing devices.

Desktop systems also have the following disadvantages: they are not mobile and they require A/C power to function. Notebook systems are much more mobile than desktop systems. Notebook systems have the following advantages. They are much lighter and more compact. They include integrated mouse and keyboard functions. They include wireless networking hardware. They use batteries that allow them to run for a period of time without being plugged into an A/C outlet.

However, notebooks also have the following disadvantages. They are difficult to upgrade or repair. They are usually more expensive than comparable desktop systems. They typically have less computing power than comparable desktops. Mobile devices, including tablets and smartphones, are very small computing devices.

They have the following advantages. They are more mobile than any other type of computing device. They include a variety of integrated hardware, including cameras, microphones, and wireless networking. A wide variety of inexpensive apps are available. They can be less expensive than notebooks or desktops. They use a touch screen interface.

Mobile devices also have the following disadvantages. They are difficult to repair and nearly impossible to upgrade. If the battery fails, it can be very difficult to replace. They are difficult to use with productivity applications.

No one type of computing device is 'best'. The most appropriate type of computing device depends upon the situation: For a programmer or a graphic artist, a desktop system is typically the best choice because it has more computing power and can be connected to larger monitors.

For a traveling sales person, a notebook might be the best choice because it provides the basic functionality of a desktop but is also mobile.

For a telecommuting home user, a desktop or notebook system is probably the best choice because they are capable of running productivity applications that will probably be required by the user's employer.

For a college student, a notebook or tablet system is probably the best choice because they are highly mobile devices. For a gamer, a desktop system is probably the best choice because it can be customized to meet the computing demands of visually-intensive video games.

In this lesson, we introduced you to computing devices. Two key components comprise any computing system: the hardware and the software. There are three different general types of computing devices: desktops, notebooks, and mobile devices. Each type of device has its advantages and disadvantages. Different types of systems are appropriate for different types of users.

3.2.2 Computing Device Facts

Computer configurations come in a variety of types to meeting specific user needs. This lesson covers the following topics:

• Computer types


• How to choose a computer type


Computer Types

Common computer configurations that you should be familiar with are described in the following table. Table 1: Computer Types

Type

Description


Desktops

Also known as workstations or PCs, desktops are computer systems that are small enough to on, under, or near a desk. They are widely used, especially for business, industry, and home use. Desktops have been around for many years.

Desktop systems are equipped with peripheral devices, such as a monitor, keyboard, mouse, and speakers. Desktop systems typically have the following advantages.

• Modularity allows them to be customized to perform specific functions.


• Ease of repair and upgrade.


• Power to run CPU-intensive tasks.


• Storage capacity to handle larger amounts of data than other types of computing devices.


Desktop systems also have some disadvantages:

• They are not mobile.


• They require continuous access to an A/C power outlet.


Desktop computers are often used to connect to a network and therefore can be considered a network client. All-in-one device

A desktop computer that contains every component except the keyboard and mouse in the same case as the monitor. All-in-one systems have several advantages:

• They require less space than a desktop.


• They are easy to move to a new location.


All-in-one systems also have some disadvantages:


Type Description


• They are harder and more expensive to repair. If any component (other than the keyboard or mouse) goes bad, you will probably have to take it into a shop to get repaired.


• In most cases, you are not able to expand the memory or disk space. However, external drives can still be added using USB ports.


Notebooks and laptops

Also known as subnotebooks, notebooks and laptops are computers with all components built into one case. These systems have several advantages, they:

• Can run the same productivity applications as desktop systems.

• Are much smaller, weigh less, and use less power than desktop systems.


• Include batteries that allow them to run without external power for a period of time.


• Use flat-panel screens, that makes them easy to transport.


• Are mobile.


• Usually include built-in wireless networking.


Notebook and laptop systems also have several disadvantages. They:

• Are more difficult to upgrade or repair.


• Are usually more expensive than comparable desktop systems.


• Typically have less computing power than comparable desktops.


Hybrid laptop devices (2-in-1)

A computer that caters to the needs of both tablet and laptop users. Hybrid laptops provide a touchscreen and other tablet-style conveniences, but also provide an operating system and keyboard. Hybrid laptops are often referred to as "2-in-1" devices. These systems have several advantages. They:

• Can run standard laptop operating systems.


• Have laptop type processors.


• Have a touch screen that provides an dimension not available on a standard laptop.


Type Description


Gaming consoles

A computer system specifically built to be operated by a gaming pad instead of a keyboard and mouse. Gaming consoles are also referred to as gaming box or video game console. A gaming console includes the major computer components, such as CPU, GPU, RAM, an operating system, disk storage, etc. These components, however, are designed to work best with games and the high graphics capabilities required by these games. Another difference is that gaming consoles often use a high-definition TV for its screen or display. Example of gaming consoles include, Xbox, PlayStation, Nintendo Switch, and Wii.


Network Client

A device that can connect to a network. All of the above devices can be network clients.


Mobile Devices

Small computing devices, such as tablets and smart phones. Advantages are that mobile devices:

• Are much more mobile than any other type of computing device.


• Include a variety of integrated devices, such as cameras, microphones, and wireless networking.

• Can be less expensive than notebooks or desktops.


• Use a touch-screen interface.


Disadvantages are that mobile devices:

• Are difficult to repair and nearly impossible to upgrade.


• Don't typically let you replace the battery.


• Don't typically support the same productivity applications as notebook and desktop systems.


• Provide much less computing power than a desktop or notebook system.


Servers

A computer whose purpose is to provide shared disk storage or to perform a special service for a large number of people, such as web processing, email, or database services. As such, this is not something you would typically have in your home or would use for personal use. Servers are widely used in business. Although each server is different, most servers use many


Type Description

Computer tower with monitor, keyboard, and mouse. All-In-One Computer.

Computer laptop. Gaming Console. Smartphone.


of the same components that a desktop or client computer uses. However, servers typically have more memory, disk space, and processing power than a desktop computer.


Desktops, all-in-one devices, notebooks and laptops, and hybrid laptop devices contain a motherboard that connects all parts and sends electrical signals between them. These devices also include some type of main storage device, such as a hard disk drive (HDD) or a solid-state drive (SSD)

These systems typically include ports accessible outside of the case that allow you to connect peripheral devices (such as a mouse, speaker, hard disks, and keyboard) to the motherboard. These ports allow you to connect to the location on the motherboard needed to run that device.

When selecting a device, keep in mind that many companies that sell these devices, don't create all the parts they contain. Instead, the companies purchase individual components (such as the CPU and RAM) from other venders. These types of computers are known as Original Equipment Manufacturers (OEM) systems.

How to Choose a Computer Type

No one type of computing device is best. The most appropriate type of computing device for you depends on your job role and the way you will use it.

• For a programmer or a graphic artist, a desktop system is usually the best choice because it has more computing power and can be connected to large monitors.


• A notebook or laptop might be the best choice for someone who travels a lot because it can run productivity

applications like a desktop system, but it is much more mobile.


• For a telecommuting home user, a desktop or notebook system is probably the best choice because they can run productivity applications.


• For a college student, a notebook or tablet system is probably the best choice because they are highly mobile.


• For a gamer, a desktop is probably the best choice because it can be customized to meet the computing demands of visually-intensive video games.


3.2.3 Activity: Research Computing Devices

In this activity, you will perform research to determine the most appropriate computing device for your current or future vocation.

1. Answer the following questions about the computing needs of your chosen vocation. o What do you primarily use a computing device for?


o Does this job require frequent traveling?


o Approximately what percentage of your time do you work at the same desk?


o What software applications do you need to install and use most frequently?


o Do these applications demand high-end graphics capabilities?


o How often do you need to keep multiple application windows open at the same time?


2. Which of the following computing devices would best address your needs? o High-end desktop computer system


o Basic desktop computer system


o High-end laptop computer system


o Economical laptop computer system


o Tablet (e.g. Apple iPad, Microsoft Surface Pro)


o Smartphone (e.g. Apple iPhone, Samsung Galaxy S)


3. Write a one-page summary of your answers to the above questions.


3.2.4 Section Quiz (Section Quiz) q_itf2_compdevices_01

Which of the following is a disadvantage of notebook systems? Answers:

• *They are more expensive.

• The battery is difficult to replace.


• Productivity apps are difficult to use.


• They require AC power.


Explanation:

Notebook systems are usually more expensive than comparable desktop systems.

Difficulty replacing the battery and using productivity apps are disadvantages of mobile devices. Requiring AC power to operate is a disadvantage of desktop computers.

q_itf2_compdevices_02

Abby needs a device that she can take to a client's location and show presentations from. Which of the following devices would be the BEST option for her?

Answers:

• Desktop computer


• *Laptop


• Gaming console


• Server


Explanation:

A laptop would be Abby's best option because laptops are mobile and capable of running productivity software such as the presentation software she needs.

A desktop computer is not mobile and so would not be a good choice. A gaming console is unable to use productivity software.

A server is not mobile and is not designed to run productivity software. q_itf2_compdevices_03

Which of the following is an example of computer hardware? Answers:

• PowerPoint


• App


• *Microchip


• Web browser


Explanation:

A microchip is an example of hardware. Hardware comprises the physical components of a device such as the screen, keyboard, wires, and chips.

PowerPoint is an example of productivity software. An app is a piece of software.

A web browser is a software application that lets you browse the internet. q_itf2_compdevices_04

Which of the following devices make use of a battery as its main power source? (Select two.) Answers:

• Desktop


• *Smartphone

• Server


• Gaming console


• *Laptop


Explanation:

Smartphones and laptops both make use of a battery so that they can operate without being plugged into an AC power supply.

Desktops, servers, and game consoles all require AC power to operate. q_itf2_compdevices_05

Which of the following devices would be easiest to repair? Answers:

• *Desktop computer


• Smartphone


• Gaming console


• Laptop


Explanation:

A desktop computer is the easiest device to repair. Desktops are generally designed to be easier to open, and so they are easier to repair or upgrade when needed.

Smartphones, gaming consoles, and laptops can very difficult to repair as they are not designed to be easily opened. q_itf2_compdevices_06

Which of the following devices generally include a variety of integrated hardware such as a camera? (Select two.) Answers:

• Desktop computer


• *Smartphone


• Server


• Gaming console


• *Laptop


Explanation:

Smartphones and laptops both include integrated hardware such as wireless network cards, cameras, and more.

Desktop computers are highly customizable, but peripheral devices are not integrated. They are separate devices that are attached externally or manually installed inside the computer.

Servers and gaming consoles do not generally include a variety of integrated hardware. q_itf2_compdevices_07

Which of the following devices would be the BEST option for a gamer? Answers:

• Smartphone


• Server

• Laptop


• *Desktop computer


Explanation:

For a gamer, a desktop system is probably the best choice because it can be customized to meet the computing demands of visually intensive video games.

While smartphones do have games, a gamer probably wants something more powerful. Servers are not designed for gaming.

A laptop is generally not designed for gaming. q_itf2_compdevices_08

Tina has accepted a position as a graphic designer. She wants a powerful device that she can connect multiple large screens to. Which device would be the BEST option for her?

Answers:

• Smartphone


• Server


• *Desktop computer


• Laptop


Explanation:

For a programmer or graphic designer, a desktop system is typically the best choice because it has more computing power and can be connected to larger monitors.

A smartphone does not provide the computing power needed. Large external monitors cannot be connected to a smartphone.

Servers are not designed for graphic design or to connect multiple monitors.

A laptop does not have the necessary computing power required nor does it allow multiple large screens to be attached. q_itf2_compdevices_console

Which type of device is designed specifically for video gaming and is designed to be connected to a HD TV for display? Answers:

• *Console


• Desktop


• Server


• Tablet


Explanation:

A gaming console can have many of the same components as a PC, such as a CPU, graphics GPU, RAM, and even a hard drive. However, they are designed specifically for games and are controlled using gaming pads.

A desktop PC can play video games, but it's not designed for that specific purpose like a console.

A server is never used for gaming. In fact, a server should never be used for day-to-day tasks. It should only be used to provide services to client workstations.

A tablet can play games, but it does not have the power or graphics capabilities of a console. q_itf2_compdevices_desktop

What is another term used to describe a workstation computer? Answers:

• *Desktop

• Server


• Tablet


• Terminal


Explanation:

The term workstation is interchangeable with the term desktop PC or just desktop. Normally, the term workstation indicates a more powerful computer than a standard home computer.

A server is a special type of computer used to provide services to client computers on medium-to-large networks. They use specially designed processors and RAM.

A tablet falls into the mobile device category.

A terminal is a device we used to connect to a main frame computer. The terminal was the way we communicated and sent requests for information from a centralized computer system. Servers have replaced the need for a main frame computer.

q_itf2_compdevices_home

When Sally walks into her house, she uses her voice to turn on lights and to tell her TV to turn on the news. What are these examples of?

Answers:

• *Home automation


• IoT


• Robotics


• Smart devices


Explanation:

Home automation is the ability to control everyday items with your voice or cell phone. The IoT is what makes home automation possible.

Robotics is just one part of home automation that's used for controlling motors. Smart devices are devices that have internet capabilities built into them. q_itf2_compdevices_hybrid

Christian is shopping for a new computer. He needs to be able to create documents and input data into a spreadsheet, and he also wants to be able to take notes at meetings and jot down ideas using a stylus. Which type of computer should Christian look for?

Answers:

• *A hybrid device


• A tablet


• A laptop


• A mobile phone


Explanation:

A hybrid laptop or tablet device would be a good choice. These devices can be used like a standard laptop but can also be flipped for tablet functionality.

A tablet alone may not be a good choice for creating documents and inputting data into a spreadsheet.

A laptop would be a good choice for document creation and inputting data into a spreadsheet, but not for jotting down ideas with a stylus.

A large cell phone may have ways to input data using a stylus, but it lacks the power for real computing tasks. q_itf2_compdevices_iot_01

When processing and networking functionality is integrated into everyday objects, like refrigerators, vacuums, and even clothing, what is it called?

Answers:

• *IoT (Internet of Things)


• Robot


• Automation


• Drone


Explanation:

The IoT is a term used for the ever-growing array of items that integrate processing and networking capabilities. Someday, almost everything we purchase, from clothing to appliances to vehicles, will be connected over the internet. A robot may be controllable over the internet, but it is just one of many things considered part of the IoT.

Automation is the ability to control devices and motors over network connections. Examples are things like thermostats controlled by your cell phone or lights controlled by a smart device, like Amazon's Alexa.

A drone is another device that can be controlled over the internet. It would be another device under the IoT umbrella. q_itf2_compdevices_iot_02

The promise of being able to control everyday objects over the internet using our computers and cell phones is called what?

Answers:

• *IoT (Internet of Things)


• Hacking


• Voice control


• Magic


Explanation:

The IoT is the ability to control and monitor everyday items through the internet.

Hacking is a term for someone who is maliciously trying to gain access to your computer or network.

Voice control is the ability to control a device with voice commands. It is one way to control an IoT device, but there are others.

All this is not magic; it is technology. q_itf2_compdevices_iot_03

Sara has purchased a new home. Her new home has an HVAC system that allows her to use her phone to program different temperatures at different times of the day. What device is controlling the HVAC system.

Answers:

• *An IoT thermostat


• The city power system


• The security system


• This is not available yet


Explanation:

Modern thermostats, like Nest, can connect to the internet and be controlled remotely.

A city power system has its own embedded control system and can raise or lower temperature settings during peak utilization.

Modern security systems can connect to the internet, allowing users to watch IP cameras and doorbells. A remote- controlled thermostat is sometimes also available in a package.

q_itf2_compdevices_iot_04

Which household appliance is connected to the internet and has a built-in video monitor and camera? Answers:

• *IoT refrigerator


• IoT vacuum


• IoT oven


• Washing machine


Explanation:

Nowadays, you can purchase a refrigerator that is Wi-Fi-enabled. It will usually come with a monitor and camera for video conferencing, and it may be able to read bar codes for item information.

There are internet-connected vacuum cleaners, washing machines, and ovens. These help automate various household tasks and may or may not have built-in cameras and monitors.

q_itf2_compdevices_iot_05

Tom is at work when he gets an alert on his phone about a possible home intruder. He uses a phone app to see cameras installed in his home. To his relief, it is just a delivery person delivering a package to his front door. Which kind of system is Tom using to get these alerts?

Answers:

• *IoT security system


• IoT thermostat


• IoT refrigerator


• IoT washing machine


Explanation:

New internet-connected security systems allow for remote surveillance and control. They include video doorbells, door and window sensors, and motion sensors.

Thermostats are also available with remote control capabilities.

There are internet-connected refrigerators, but they are not included in a security system. There are internet-connected washing machines, but they are not included in a security system. q_itf2_compdevices_iphone

Frank has purchased a new Apple laptop, and he also wants to purchase a new mobile phone. He wants to be able to synchronize applications between the two devices. Which type of mobile device should Frank purchase?

Answers:

• *Apple iPhone


• Google Pixel


• Windows phone


• Android phone

Explanation:

Because Frank purchased an Apple computer, it would be easiest to sync his communications with an Apple mobile phone.

If Frank uses Google apps, a Google phone is a good choice, but he may not be using these applications. If Frank had purchased a Windows laptop, a Windows phone would be a good choice.

Android phones have apps that sync to many operating systems. It's not quite as seamless as a device that is OS-specific, but it can work.

q_itf2_compdevices_laptop

Diane is in the market for a new computer; she is part of a mobile sales team. She needs a computer that is very portable, can be used to give presentations, and is able to remotely connect to her main office to pull important sales reports. What is a good computer choice for Diane?

Answers:

• *A laptop


• An all-in-one desktop


• A tablet


• A full desktop


Explanation:

A laptop is the best choice in this scenario. It has the power of a full-sized desktop with the portability she needs. An all-in-one desktop is not a portable option, although it is a smaller-footprint desktop.

A tablet is portable but does not have the computer power she needs for presentations and to run reports. A full desktop is not a portable option.

q_itf2_compdevices_pda

What was the original name given to small, portable devices that were intended to help us in our everyday tasks? Answers:

• *Personal Digital Assistants (PDAs)


• Smart devices


• Personal computers


• Mobil assistants


Explanation:

The original devices intended for mobile use were called Personal Digital Assistants, or PDAs. The term PDA was introduced by Apple for its Apple Newton product in 1992. The IBM Simon was the first PDA with cellular functionality, which can be considered the first smartphone. It was released in 1994.

The term smart device is a newer term describing TVs that have networking functionality.

The term personal computer (PC) dates back to the early 1980s when IBM and Apple were introducing computers that were operated directly by an end user.

Mobile assistant is not a term we use for personal devices or tablets. q_itf2_compdevices_processor

Modern computing devices are getting smaller, lighter, and more energy efficient. What is an example of a CPU that meets these criteria?

Answers:

• *Atom processor


• Xeon processor

• Apyc processor


• Pentium processor


Explanation:

An Atom processor is an Intel brand that is designed for low-power, smaller-form devices. A Xeon processor is an Intel processor designed for server computers.

An Apyc processor is an AMD chip for server computers.

A Pentium processor is an Intel chip designed for desktop computers. q_itf2_compdevices_server

What do we call a computer that is designed to provide services to client computers and is built using more robust, powerful components?

Answers:

• *Server


• Desktop


• Workstation


• Tablet


Explanation:

A server is a special computer running unique tools, such as a server processor, ECC memory, and a powerful operating system. Servers provide services to client computers.

A desktop computer is a single-user computer. On medium-to-large networks, they would be the client computers.

A workstation computer can also be a desktop PC, but we usually associate workstations with more powerful desktop computers (but not as powerful as a server). A workstation would also be considered a client on a medium-to-large network.

A tablet does not have the power to be used as a server. q_itf2_compdevices_tablet

Sean is in the market for a new computing device he can take on vacation. He wants to be able to read e-books, watch movies, and videoconference with co-workers if needed. Which type of device should he purchase?

Answers:

• *A tablet


• A larger, newer phone


• A laptop


• An all-in-one computer


Explanation:

A tablet is the best choice. Most new tablets have long battery lives, built in Wi-Fi capabilities, and built-in speakers and cameras for video conferencing.

A large cell phone might work, but most cell phones do not have the required screen size. A laptop does not have the same mobility features as a tablet.

An all-in-one computer is more computer power than is needed and is not designed for mobility. q_itf2_compdevices_touchscreen

Early PDA (Personal Digital Assistant) devices suffered from clumsy user interfaces and hard-to-maneuver menu systems. What do modern smartphones and tablets have that makes them so much easier to operate?

Answers:

• *Touchscreen display


• Newer menu items


• Voice commands


• Larger screens


Explanation:

The advent of touchscreen displays has made mobile devices much easier to use. Many menu items are no longer needed with touchscreen devices.

Voice commands are growing in their capabilities and will someday replace the need for touchscreens, but we're not quite there yet.

Larger screens are not the reason PDAs are easier to use. q_itf_compdevices_facts_01

Which of the following is primarily operated by a touchscreen? Answers:

• *Tablet


• Notebook


• Desktop


• Network


Explanation:

Mobile devices, such as tablets and smartphones, are operated primarily through their touchscreens. Notebooks sometimes have touchscreens but are generally operated with the mouse and keyboard. Desktops are almost always operated through the mouse and keyboard.

Networks are groups of computers that can share information with each other. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_compdevices_facts_02

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose?

Answers:

• *Desktop


• Laptop


• Gaming Console


• Server


Explanation:

Desktop systems have many advantages over other types of computing devices. They are modular in nature, meaning you can combine different pieces together to customize the system to do exactly what you want it to do. This makes them easier to repair and upgrade.

Laptops typically have less computing power than comparable desktops and are more difficult to upgrade and repair. A gaming console would not be an appropriate choice for a home office computing environment.

A server provides network services to clients on a network and would typically not be needed in a home office.

3.3 Internal Components Section Introduction

As you study this section, answer the following questions:

• Which components are involved with each of the following: input, output, processing, and storage?


• How do individual components work together?


• How would a malfunction in each component affect the system as a whole?


In this section, you will learn to:

• Describe the most common internal components of a typical computer system, including processor, RAM, motherboard, power supply, GPU, NIC, and cooling system.


• Distinguish between the two main types of consumer-level CPUs.


• Describe how computer processors execute instructions.


• Follow guidelines to reduce electrostatic discharge when working with computers.


• Identify various types of expansion slots on a motherboard.


• Install a single memory module on the motherboard.


• Disconnect a monitor from the video card and remove the card from the computer.


• Install a video card with an HDMI connection and connect the PCIe power connector to the video card.


• Connect a computer to a monitor using an HDMI cable.


• Configure a monitor’s display resolution for full HD content.


Key terms for this section include:


Term Definition


Bus

The communication system that allows data to be transferred between the


Central processing unit

The most important part of any modern computer system; it controls the other parts


Random access memory

The main memory of a computer that can be quickly accessed by the CPU. It is


Motherboard

A large, flat computer component that connects the important components of the


Power supply A unit that s

Graphics processing unit (GPU)

An additional computer processor that provides graphics processing. It improves


Network interface card

A component, sometimes built into and sometimes plugged into the motherboard,


Cooling system

Components, including heat sinks and fans, that keep computer components from


Electrostatic discharge

An event in which two objects with different charge levels come together resulting


The fetch A three


x86 processors

A family of processors manufactured by Intel and AMD that use a common


Advanced RISC

A family of processors most often used in smartphones due to its lower powe


Expansion card

A circuit board that connects to a computer's motherboard, giving it additional


Heat sink

A computer component that attaches to a


Air cooling

A common method of cooling that uses fans to move hot air out of a system.


Water cooling A liquid


Active-liquid heat sink

A cooling system composed of a liquid heat sink, internal liquid pump, a fan, and


Immersion cooling

An advanced system of cooling in which liquid coolant is in direct contact with the


3.3.1 Internal Computing Components (Lesson Video) Transcript:

In this video, we're going to look inside a typical computer system and talk about some of the most common internal components.

The most important part of any modern computer system is the central processing unit, or CPU. Just like the brain controls the body, the CPU controls the other parts of the computer by getting information from them, then telling them what to do. After receiving raw input data from the user, the CPU applies the data to a list of instructions, called a computer program. Then, the CPU follows, or executes, each line of the computer program in order, turning the data from the user into information. This is called processing.

The CPU is great at performing calculations, but it can only deal with one line of instructions at a time – it can't keep track of the whole program all at once. Instead, the computer stores this information in RAM, or random-access memory.

When you run a program, the computer loads the instructions into its RAM. Then, the processor gets the first line of instructions from the RAM, executes it, and writes the result back into RAM to use later. RAM is extremely fast, but it's also volatile. If you turn off the computer system, RAM will forget everything. For this reason, RAM is sometimes called short-term memory – it's only concerned with whatever the computer is working on right now.

The CPU and RAM are connected by a large flat component called a Motherboard. The Motherboard is like the spine in your body – it connects all the other parts to each other and sends electrical signals between them. An important part of the motherboard is a chip that contains the BIOS, or Basic Input Output System. The BIOS is like your brainstem, which controls basic functions like heart rate and respiration. When you restart a computer, the BIOS makes sure all the necessary parts are plugged in and working properly, then tells the operating system to start loading.

Another responsibility of the motherboard is to make sure all the components get the right amount of electricity. This electricity comes to the computer through a power supply unit. Power supplies take AC power from the wall outlet and convert it into DC power. They typically have a variety of cables and plugs that attach to the motherboard near each powered component.

Many computers today handle graphics processing through the CPU and RAM on the motherboard. This is called integrated graphics and is adequate for most uses. However, activities like gaming, video editing, and 3D animation require a second processor that's dedicated specifically to graphics processing. This is called a GPU, or Graphics Processing Unit. GPUs are built on expansion cards that plug into the motherboard, and they contain their own specialized RAM and cooling fan.

Today, most computers need to connect to the Internet. That's the job of the Network Interface Card, or NIC. Some motherboards have a NIC built in, while others need one to be added on. Some NICs are for a wired connection, some are for wireless, and some can do both.

One of the problems of high-speed computing is that it can produce a lot of heat. A typical desktop CPU can get hot enough to boil water. This much heat can damage delicate components if it isn't appropriately dealt with. In a typical desktop system, this is done with heat sinks and fans. A heat sink is a piece of metal that absorbs heat in a way that makes it easy to dissipate. Heat travels up the heat sink into thin branches, which maximize its contact with the air. Then, fans throughout the system replace the hot air inside the machine with cool air from the outside.

We've just learned about several internal components you'll find in a typical computer. We learned about CPUs, RAM, motherboards, power supplies, GPUs, NICs, and cooling systems.

3.3.2 Internal Computing Component Facts

This lesson covers the topic of internal computer components. Internal Computer Components

The following table looks inside a typical computer system and describes some of the most common internal components.

Table 1: Internal Computing Components Component

Description


CPU

The most important part of any computer system is the central processing unit (CPU). Just like the brain controls the body, the CPU controls the other parts of the computer by getting information from them and then telling them what to do. A CPU is a programmable integrated circuit (PIC) or also known as a microprocessor. Microprocessors, such as the CPU, contain a set of electronic circuits created on a small flat piece of semiconductor material, normally made of silicon.

After receiving raw input data from the user, the CPU applies the data to a list of instructions, called a computer program. The CPU then follows (executes) each line of the computer program in order, turning the data from the user into information. This is called processing. CPUs have a clock speed, sometimes call a clock rate. A computer's CPU clock speed is one indication of its performance capabilities. The CPU clock speed is a representation of how may cycles (number of instructions) per second it can execute, rated in gigahertz (GHz).


RAM

The CPU is great at performing calculations, but it can deal with only one line of instructions at a time. It can't keep track of the whole program all at once. Instead, the computer stores this information in random-access memory (RAM). When you run a program, the computer loads the instructions into its RAM. Then, the processor gets the first line of

instructions from the RAM, executes it, and writes the result back into RAM to use later. This system bus path between the CPU and RAM is sometimes called the front side bus, (FSB). RAM is extremely fast, but it's also volatile. This means that if you turn the computer system off, everything in RAM is deleted or lost. For this


Component Description


reason, RAM is sometimes called short-term memory. It's only concerned with whatever the computer is working on at the time. RAM is added to a computer using a RAM stick, also known as a Dual In-line Memory Module (DIMM). The following is a list of the main types of RAM:

• DRAM - Commonly used as the main type of RAM in a computer. Key points are: o DRAM uses a transistor and a capacitor within an integrated circuit.


o To store something in DRAM, a data bit is stored in the capacitor.


o Since capacitors leak small amounts of electricity, DRAM must be refreshed, meaning it is given a new electrical charge.


• SRAM - Also uses transistors, but unlike DRAM, SRAM stores its information in the transistor. Therefore, it does not need to be refreshed. Data stored in SRAM remains there until the power to the computer is turned off.


• SDRAM - SDRAM is synchronized DRAM. Key points are: o The memory and CPU clock speed are synchronized.


o The synchronization.enables the memory controller to know the exact clock cycle when the data requested will be ready.


o SDRAM uses a 64-bit bus which means it can send 64 bits of information in each clock cycle.


• DDR SDRAM - DDR stands for Double Data Rate. Key points are: o DDR transfers data twice as fast as SDRAM; once at the beginning a the clock cycle and again at the end of the clock cycle.


o DDR transfers 64-bits at a time.


o This process is also known as double-pumped.


o With each improvement to DDR, a new number was added to the name, such as DDR2, DDR3, and DDR4. DDR5 is soon to be released.


o With each new release, the way the memory works becomes faster and uses less power.

Motherboard

The CPU and RAM are connected by a large flat component called a motherboard (sometimes called a system board). The motherboard is found in devices, such as laptops, desktops, and servers. The motherboard is like the spine in your body. It connects all the other parts to each other and sends electrical signals between them. For example, a motherboard gives you access to the input/output ports you use on the computer. These ports can include USB, HDMI, DVI, SATA (used for hard drives), RJ-45 (Ethernet), and audio. A major component of the motherboard is its built-in processors.

Key points are:


Component Description


• The built-in processors are also know as a chipset.


• They act as a communication hub or traffic control center for the motherboard.


• The chipset controls the compatibility of the components that can plug into the motherboard, including the CPU.


• The chipset provides function needed to run the computer. Without the chipset, the computer would require an adapter card to perform the function.


Another important part of the motherboard is a chip that contains the Basic Input Output System (BIOS). When you start a computer, the BIOS makes sure all the necessary parts are plugged in and working properly. It then tells the operating system to start loading.


Power Supply

The motherboard makes sure sure all components get the right amount of electricity. This electricity comes to the computer through a power supply unit. Power supplies take AC power from the wall outlet and convert it into DC power. They typically have a variety of cables and plugs that attach to the motherboard near each powered component.


GPU

The CPU is the main processor in a computer. Often computers require additional processing power for creating images and graphics. This is supplied by a graphics processing unit (GPU). Most computers handle graphics processing through the CPU and RAM on the motherboard. This is called integrated graphics (on-board graphics). Computers used primarily for gaming, video editing, 3D modeling, and animation need a second GPU that's dedicated to graphics processing. The best dedicated graphics cards (often called video cards) are expensive because they also include their own specialized RAM and cooling fan.


NIC

Today, most computers need to connect to the internet. That's the job of the network interface card (NIC). Some motherboards have a NIC built in, while others need one to be added on. Some NICs are for a wired connection, some are for wireless, and some can do both.


Component Description CPU. RAM.

Motherboard.

Power Supply.

GPU.

Network Interface Card (NIC).


Cooling Cooling.

One of the problems of high-speed computing is that it can produce a lot of heat. A typical desktop CPU can get hot enough to boil water. This much heat can damage delicate components if it isn't appropriately dealt with. In a typical desktop system, this is done with heat sinks and fans. A heat sink is a piece of metal that absorbs heat in a way that makes it easy to dissipate. Heat travels up the heat sink into thin branches, which maximize its contact with the air. Fans throughout the system replace the hot air inside the machine with cool air from the outside.


3.3.3 Electrostatic Discharge (Lesson Video) Transcript:

In this lesson, we're going to talk about electrostatic discharge (ESD). As a PC technician, ESD is your worst enemy. You need to know what it is and how to mitigate its effects.

A static charge is created whenever two objects come into contact with each other and then are separated. When the objects separate, one of the objects can steal electrons from the other object, which makes the first object negatively charged. The object that lost electrons becomes positively charged. These two objects now have different charge levels. An electrostatic discharge occurs when two objects with the different charge levels come together. If an object that has a high positive charge comes into contact with another object that has a high negative charge, the charge from the object with the higher electrical potential flows or jumps to the object with the lower potential. The result is an electrostatic shock.

As a technician, you need to understand that a computer component, such as a memory chip or a CPU, can be damaged by an electrostatic discharge as small as 100 volts or less. When you hear 100 volts, it sounds like a lot. We're used to dealing with 110 volts from our wall outlets, so smaller DC voltages of 12, 5, or 3.3 volts, inside the PC makes 100 volts sounds like a lot.

When we're talking about ESD, an ESD discharge must be about 3,000 volts before you can see it or feel it. When you touch a doorknob and you get a shock, you're dealing with at least 3,000 volts.

This means that you could be working on a PC system and be shocking the daylights out of the components and not even know it because the discharge is so small that you can't see or feel it. However, it's enough to hurt the components.

ESD is bad, but there are a number of steps that you can take to reduce the risk of ESD when you're working on a PC system.

First, discharge yourself before you touch any PC component. There's a lot of different ways you can do this, but the easiest way is to simply touch the case frame of the PC system. When you do that, any electrical potential or difference in potential that may have existed between you and the case is immediately discharged.

The next thing you can do is use a static mat that allows you to equalize the electrical potential between you and the PC system. You can also use static floor mats or static floor materials. A static floor mat is designed to keep you in balance with the electrical potential of everything around you.

If you've ever walked through a carpeted room in socks, you know that you will build up an electrical charge. When you use static floor mats or static flooring material, that charge never builds up. Any charge that you may have is immediately dissipated through the mat or through the floor.

When you're handling an electrical component out of the computer, like a memory chip or a CPU, don't touch the gold or silver leads on the bottom of the component. On the expansion board card, don't touch the little tab connectors. The reason is that any static discharge goes through these leads traveling right into the heart of that component and probably shorting circuits. So don't touch the leads.

You should store your components in static shielding bags. If you've ever bought a computer part from a computer store before, then you've probably noticed that the part came in a gray bag. That's a static shielding bag. It has an additional layer built into it underneath the plastic that absorbs electrical discharges as they occur. It dissipates the discharges around the component instead of letting them go through and hurting the component.

If you ever purchase a part and it comes in a pink, blue, green, or clear bag, those are static resistant bags. If you see this kind of bag, be extra careful because those bags don't provide the same level of protection against ESD that a static

shielding bag does.

Watch out for static producing materials in your work area. These include plastic and Styrofoam. Plastic and Styrofoam can build up a great deal of electrical charge in you that can subsequently shock your components. Keep plastic and Styrofoam away from your work area as much as possible.

Remember that humidity is your friend when you're dealing with electrostatic discharge. The higher the humidity, the less likely that an electrostatic discharge will occur. Dry air acts as a resistor and allows static electricity to build up. To keep static down, you should keep the humidity in your work area relatively high.

So let's review. Electrostatic discharge can be a really bad problem because when it happens, you may not even know it has occurred. It takes only a small amount of voltage to ruin a PC component. To keep electrostatic discharges from happening, make sure you use static prevention measures like using a static mat and a static floor mat. Keep substances that cause static charges, like Styrofoam and plastic, away from your work area and increase the humidity in the room to keep the static down.

3.3.4 The Fetch-Execute Cycle (Lesson Video) Transcript:

All computers, from pocket calculators all the way to cutting-edge supercomputers, work on the same basic principles of input, processing, output, and storage. In this video, we'll discuss what processing is and how it works.

To show how processors work, we'll make a diagram of an extremely simple computer that has only two components. The first component is the CPU, or central processing unit. The CPU performs calculations, reads and executes instructions, and controls all the other devices connected to the computer. This is called processing. Every CPU contains a clock, which controls the exact speed that a processor will execute instructions. The faster this clock ticks, the faster the computer runs. In our example, the clock will tick whenever you hear this noise.

This CPU has three registers, which store values the computer is directly working with at a particular moment in time. We'll call them the program counter, the instruction register, and the accumulator.

The second component of our simple computer is RAM, or random-access memory. RAM stores the instructions for the CPU to execute, as well as the results of any calculations that the processor doesn't need to work with right now. Each physical location on the RAM chip has a unique address and can store a single value. It's called "random access" because the computer can read and write to any location in any order.

Now that we have our computer, let's give it something to do. Whenever you launch an application, the computer takes the instructions for that program from long-term storage and loads them into RAM. These instructions are for a simple program that starts at zero and counts up by threes. Generally speaking, each instruction will have two parts – the first part tells the computer what to do, and the second part is a memory address that tells the computer where to do it.

Now that the instructions are in place, the processor can start working on them. Every time the clock ticks, the processor will do one of three things, always in the same order. It will fetch an instruction from memory, decode the instruction, then execute it. This process is called the fetch-execute cycle, and it's the only thing the processor knows how to do.

Ready to start? Here we go.

First, the CPU will fetch the instruction at whatever memory address is stored in the program counter. Right now that's 0, so it grabs the instruction from location 0 and adds it to the instruction register.

Next, it decodes the instruction, or figures out what it's supposed to do. This instruction says LOAD 4, which means it needs to grab the value from memory address 4 and add it to the accumulator.

Now, it executes the command it just decoded. It grabs the value from address 4, which is zero, and stores it in the accumulator. It also increments, or adds one, to the value in the program counter.

We're back to the fetch step. The computer grabs the instruction from address 1 and adds it to the instruction register. The computer decodes the instruction. This time, it says to add the number stored at memory address 5.

The computer executes the instruction, adding the value at address 5, which is 3, to the value that's already in the accumulator. It also increments the program counter.

Time to fetch again. The computer grabs the instructions from address 2 and adds them to the register.

This time the instruction has the command STORE 4, which means it needs to write the current value in the accumulator into memory at address 4.

The computer replaces the value in address 4 with the value in the accumulator, which right now is 3. The program counter increments.

The computer grabs the instruction from address 3.

The instruction here says JUMP 1. The JUMP command tells the computer which command to execute next. In this case, it'll go back to memory location 1.

The computer executes the instructions, setting the counter back to 1. Since it's already set the counter in this step, it

doesn't increment like it usually would.

As you may have already figured out, this will create an endless loop. Eventually, the computer will get right back to address 3, which will send it back to address 1, which will lead back to address 3. The ability to execute instructions in a loop is one of the things that makes computers so powerful.

Fetch time. The computer grabs instructions from address 1.

ADD 5. The computer needs to add the value from address 5 to the accumulator.

The computer takes the value from address 5, which is three, and adds it to the three already in the accumulator, making six. The counter increments.

Fetch the instruction from address 2.

STORE 4. Whatever's in the accumulator will be written to address 4.

The computer replaces the value at address 4 with the value in the accumulator, which is six. The counter increments. Fetch.

Decode. Jump back to 1. Execute. Counter value set to 1.

And so on. Every ninth tick, or third cycle, the process repeats itself.

It's important to understand that the instructions and memory values are actually just a series of positive and negative electrical charges, which we represent as ones and zeros using the binary number system. This is called machine language, and it's directly tied to the physical hardware. While it's technically possible to program a computer in binary, it's extremely difficult to do. Instead, today's developers write code in a programming language, which is a human- readable way to write computer instructions. For example, this code in the C++ programming language does the exact same thing we just saw in our simple processor. It creates a variable, or little chunk of memory that stores a value, and sets its value to zero. Then, in an endless loop, it increases the value of the variable by three. To run this code, a piece of software called a compiler translates it into machine language that can be loaded into RAM and executed by the processor.

It's also important to know that clock speeds on modern processors are unbelievably fast. A 2 gigahertz processor can execute two billion instructions every second. If it's a dual-core processor, it can execute two sets of instructions at that rate simultaneously – four billion instructions every second. Let me try to put that in perspective. If you tried to count to four billion at a rate of one number per second, it would take you more than 126 years.

In this video, we took a first look at how processors follow a three-step cycle: Fetch, decode, and execute. No matter how simple or complex, all computers work by using this process.

3.3.5 CPU Types (Lesson Video) Transcript:

The central processing unit is the most important component of a computer system. Just like the brain in your body, the CPU performs complex computations that turn raw data from the environment into useful information. In this video, we'll look at different kinds of consumer-level CPUs.

Most large computers, such as desktops, laptops, and servers, use x86 processors. x86 refers to the processor's instruction set, or the list of commands that a processor can execute. Today, most x86 CPUs are designed to process 64 bits of information at once. However, some older models could only process 32 bits at a time. The two biggest manufacturers of x86 processors are Intel and AMD.

x86 processors are extremely powerful, but they consume a lot of power and generate immense heat. That's a problem for mobile devices, which depend on battery power and are often carried in their owners' pockets. Most tablets and smartphones use ARM processors. ARM processors use a reduced instruction set, which means they can't do as many types of things as x86 processors. The tradeoff is that they are smaller, consume less power, and generate less heat.

In this video, we looked at two kinds of CPUs: x86 processors, which are used in large computers, and ARM processors, which are used in mobile devices.

3.3.6 CPU Facts

The central processing unit (CPU) is the most important component of a computer system. Just like the brain in your body, the CPU performs complex computations that turn raw data from the environment into useful information.

This lesson covers the following topics:

• CPU types and descriptions


• CPU brands

CPU Types and Descriptions

CPUs have a clock speed, sometimes call a clock rate. A computer's CPU clock speed is one indication of its performance capabilities. The CPU clock speed is a representation of how may cycles (number of instructions) per second it can execute and is rated in gigahertz (GHz).

Although increasing the clock speed can improve a computer's performance, it also consumes a lot of power and heat. To work around some of these types of drawbacks, most computers now support Symmetric Multiprocessing (SMP). SMP is an architecture that allows two or more CPUs to be connected to the same system. This, however, also has a drawback of additional costs.

To help cut down on costs, developers have come up with a way to integrate two or more processors into one chip. This technology is known as chip-level multiprocessing (CMP), multi-core, or dual-core CPUs. Dual-core means that only two processors have been integrated while multi-core means more than two processors have been integrate.

The following table describes CPU types. Table 1: CPU Types and Descriptions CPU Type

Description


x86

Most large computers, such as desktops, laptops, and servers, use x86 processors. x86 refers


ARM Processors

The x86 processors are extremely powerful, but they consume a lot of power and generate


CPU Brands

Many companies, including, Intel, AMD, NVIDIA, Qualcomm, and Hewlett-Packard, manufacture CPUs. While each of the CPUs differ in some way, most of these companies produce models, and brands within the models, to fit different needs. For example there are budget computers, mainstream (mid-range and laptop) computers, and high-end (servers and gaming) computers.

Most manufacturers use the model name for marketing purposes, but the brands within the models helps you distinguish the differences within that model.

The following table overviews the several CPU brands for the two most common manufacturers: AMD and Intel: Table 2: CPU Brands

CPU Type Description


AMD

AMD has had many brands throughout the years, such as Am2900, AMx86, Athlon, Sepron, Phenom


Intel

Intel has the following brands.


3.3.7 Motherboards and Expansion Cards Bus Technology

When working with computes, a bus is the communication system that allows data to be transferred between the components inside a computer. The term bus comes from the Latin word omnibus, which means "for all". For example, a motherboard has many small wires spanning the motherboard. These tiny wires, or circuitry, make up the bus which as been imprinted on the circuit board, or PCB. The computer bus is responsible for transferring the following:

• Power - Each component requires electricity, the bus provides this power.


• Data - The data is the information that is transferred between the components in the computer.


• Memory location - Memory is a major component in a computer system, as it temporarily stores the data while its needed for processing. The bus keeps track of the address or location where the data is stored in the memory.


• Clock timing - A computer has an clock mechanism, often performed by the CPU, which synchronizes how all the components work together over the bus.


Throughout the years the architecture of the expansion bus has changed. Since the architecture of the bus is dependent on the motherboard and CPU, it's good to know the type of bus systems that have and are being used:

• PCI - The Peripheral Component Interconnect, or PCI, is an older technology but can still be found in many computers. The PCI bus is usually 32-bits wide, although 64-bit versions were used as well. Running at 33 MHz, it can transfer data at 133 MB/s (or 266 MB/s for 64-bit versions).


• PCI with AGP - AGP is similar to PCI, but designed specifically for graphics support. Motherboards that provide AGP support have a single AGP slot. AGP is commonly used for video cards in modern computer systems, but has been replaced by PCIe.


• PCI Express - PCI Express, or PCIe is a next generation I/O bus architecture. Rather than a shared bus, each PCIe slot links to a switch which prioritizes and routes data through a point-to-point dedicated connection and provides a serial full-duplex method of transmission. o Basic PCIe provides one lane for transmission (x1), at a transfer rate of 250 MBps. It can also provide multiple transmission lanes (x2, x4, x8, x16, x32). Newer versions of PCIe can transfer data at an even higher rate per lane: . Version 1: 250 MBps


. Version 2: 500 MBps


. Version 3: 1 GBps


. Version 4: 2 GBps

o In addition to greatly increased speed, PCIe offers higher quality service.


o PCIe is backwards compatible and allows legacy PCI technology to be run in the same system (i.e. you can have both PCIe and PCI buses in the same system).


o PCIe buses are most commonly used for video cards in modern computer systems, although nearly any other device can be designed for a PCIe slot.


Expansion Cards

An expansion card is a circuit board that connects to a computer's motherboard. The expansion board gives the motherboard additional power or functionality.

Let's now discuss the following expansion card topics:

• Expansion slots on a motherboard


• Video cards


• Network cards


• Audio cards


• Other card types


Typically, expansion cards connect to a slot in the motherboard called a Peripheral Component Interconnect (PCI). Another common type of slot is the PCI Express (PCIe). The following graphic shows a motherboard.

Expansion Card


Expansion card.

Expansion Slots

The following graphic shows a expansion slots on a motherboard. Expansion Slots on a Motherboard


Expansion slots on a motherboard. Video Cards

A video card, also called a display or graphics card, is used to enhance the quality of images shown on a display. Rendering images requires a lot of processing power.

A video card acts like an extra CPU that works exclusively on graphics. This frees up the computer's main processor for other tasks. A typical video card includes a graphics processing unit (GPU); a cooling mechanism (such as a fan); and memory and monitor ports such as HDMI.

Network Cards

A network interface card (NIC) enables a device to connect to a network. Many modern computers have a built-in NIC, but also have the option to add additional NICs to expand the functionality of the system.

A NIC connects the device to the network through a RJ-45 port that connects to an unshielded twisted pair cable, as shown in the following graphic.

Network Interface Card with RJ-45 Port


Network interface card with RJ-45 port. Audio Cards

An audio card (sound card) converts electrical signals to audio signals. This is done using a digital signal processor (DSP) chip.

• This specialized chip has been optimized for the operational needs of converting electrical signals to audio signals.


• The conversion recreates the sound we hear through computer speakers or earphones.


• Sound cards are also used for voice over IP (VoIP), teleconferencing, and other audio functions.


Most audio cards use different kinds of input/output jacks and ports for connecting such things as headphones, microphones, or speakers. Audio cards have many uses, but are often used in configuring surround sound systems, such as a digital theater system used in a home theater.

• Surround systems are often referred to as 5.1 or 5.7 systems.


• The number (such as 5.1) refers to the number of speaker placements found in the system.


The input/output ports found on audio cards are color coded for easy identification, as shown in the following table. Table 1: Audio Input/Output Ports

Color Connector


Lime Green

Line-out. Used for front speakers and headphones. Used with 5.1 surround sound systems.


Pink Microphone.


Light Blue Stereo line


Orange

Subwoofer and center


Black

Rear sound speaker for 5.1 and 7.1


Gray

Middle surround speakers for 7.1 systems.


Gold

Midi/game port (a joystick).


Not all audio cards will have all of these ports.

Some audio cards can also include a Sony/Philips Digital Interface Format (S/PDIF) port. S/PDIF is a protocol used to transfer electrical and digital audio signals between components and devices over short distances. These ports use either a fiber optic cable via TOSLINK or a coaxial cable with RCA connector.

Other Card Types

Desktop computers typically have built-in USB ports. But in some cases, they may require more depending on the number of USB devices needed for a task. You can install a multi-port USB expansion card to increase the number of USB ports. It allows for faster connection than a USB splitter.

3.3.8 Power and Cooling Options

Whether you have a laptop or desktop, your computer utilizes a power supply and cooling technologies. This lesson covers the following topics:

• Power


• Cooling


Power

One of the most important system components is the power supply unit (PSU). It converts electricity from the alternating current (AC) provided by the power company into low-voltage direct current (DC). Since each system requires a specific amount of power, it's imperative to have a PSU that provides the system with an adequate amount at all times.

PSUs are generally designed with around 40% greater capacity than the required power consumption of the system. A PSU that doesn't provide the right amount of power can result a variety of issues whose cause can be difficult to identify, such as random restarts and freezes. Choosing the correct power supply for the system allows for the best possible performance and long-term dependability.

Power Supply Unit


Power supply unit.

The PSU is mounted just inside the back of the computer's case. It can be found by following the power cable to the back of the computer. At the back of the power supply, you will see a fan that sends air out of the case. PSUs are rated by wattage to show how much power they can provide to the computer.

Power requirements for a personal computer without high-performing CPUs or graphics cards is usually 300W to 500W. High-performance computers can use up to 1000W. Most modern desktop computer PSUs conform to the ATX specification that provides 5-Volt Standby (5VSB) voltage.

ATX PSUs receive a signal from the motherboard to power the computer on or off and show when DC voltages are safe to power up and boot. The PSU has large, colorful bundles of wires which are designed to plug into the motherboard, fans, hard drives, and optical drives.

Cooling

A computer's Central Processing Unit (CPU) can get very hot while processing data. Due to this, the CPU may damage itself or other components if not properly cooled. To combat overheating and excessive power use, computers are equipped with cooling systems that regulate the temperature to allow for maximum performance.

In recent years, CPUs have substantially decreased in size while exponentially increasing in power. Because of this, cooling methods have become an increasingly critical part of new CPU designs, leading to new and enhanced technologies. Common cooling technologies include the following.

Heat Sink

A heat sink is a term for a component that disperses heat from another object. In computers, a heat sink attaches to a chip (like a CPU) and prevents it from overheating by transferring its heat to a fluid medium such as air or liquid.

Often, air cooling is used with a heat sink to help move heat away from the CPU. The performance of the heat sink can be affected by many factors such as air velocity, material choice, and fin design.

Because of the bulky size of a heat sink, laptops typically use heat spreaders instead of heat sinks for cooling. Heat spreaders are installed next to a large flat surface. Heat spreaders do not cool the CPU themselves, rather they spread the heat from the CPU out against the large flat surface to allow the heat to dissipate. Heat spreaders have no fins or fans like the heat sinks below which makes them ideal for slim laptops.

Pin Fin, Straight Fin, and Flared Heat Sinks


Pin fin, straight fin, and flared heat sinks. Air Cooling

Air cooling is currently the most common method of cooling. By integrating fans in series (placed on top of one another) or in parallel configurations (side by side), they are able to efficiently move hot air out of the system. Air cooling doesn't require piping elements, tubing, or cables and is typically a cheaper option.

Traditional air cooling does come with a few downsides, however. Fans that are used for cooling are not as efficient as other cooling technologies such as water cooling. Also, fans are often large and loud.

Water Cooling

A liquid-cooled system places a water-cooled heat exchanger near the heat source. This exchanger then removes the heat

and reduces the air temperature. Because of water's higher density, liquid cooling can efficiently absorb heat.

Water cooling also provides lower power consumption. Fan speeds are decreased because they don't have to move a large amount of air. This also lowers the system's noise levels and power consumption.

Active-Liquid Heat Sink

Active-liquid heat sink (ALHS) designs have become popular because they do not use external liquid pumps that are typically found in liquid cooling systems. An ALHS system is composed of a liquid heat sink, internal liquid pump, a fan, and a radiator that all actively pump cooled liquid in and out with no help from an outside pumping system.

This space-saving design integrates the liquid heat sink and pump, eliminating the housing and reducing the overall dimensions of the cooling system. When ALHS is compared to liquid-cooled, heat pipe, and air-cooled systems, it consistently has the best thermal performance.

Immersion Cooling

Immersion cooling (IC) is an advanced system of cooling in which the coolant is in direct contact with the CPU. This type of cooling offers a high heat transfer that quickly reduces the temperature of the CPU's surface.

Some IC technologies spray very fine droplets of de-ionized water directly onto the CPU, cooling the surface through a combination of thermal conduction and evaporation. Typically, the spray mechanism is activated only when the temperature of the CPU reaches a certain level.

Immersion cooling can make changing computer components more complicated. For example, if you were to replace a memory module, you would have to pull out the tank and let the liquid drip out before you remove and replace the memory. This requires extra time and cleanup. Also, systems with IC cannot have any moving parts, such as spinning- disk hard drives.

3.3.9 Explore the Motherboard (Demo Video) Transcript:

In this lab, you'll explore the inside of a desktop computer. To open the computer, click the Motherboard button. To see a diagram of the motherboard, select the motherboard, click Details, then click Specifications. This opens a diagram that shows each of the motherboard components.

First, we'll look at the computer's memory. Use the scroll wheel on the mouse to zoom in and out. This computer has two RAM modules installed, each with 8GB of memory.

Next, we'll look at the processor. This computer's processor is underneath this heat sink and fan. We can remove the fan by dragging it away. Now we can select the processor and view its specifications.

Next, we'll look at the power supply. If we click the power supply, we can see that it's connected to the motherboard and to each of the three hard drives. We can look at the specifications down here.

Next, we'll look at the hard drives. Each one has two connections – A power connection and a data connection. The power connection comes from the power supply, and the data connection goes to the motherboard.

Now, let's look at the back of the computer. Zoom out, then click Back. This computer has three ports for different types of monitor connections: Display Port, HDMI, and DVI, which is currently plugged in.

It also has five A-type USB ports. The black ports are USB 2.0, and the blue ports are USB 3.0.

3.3.10 Explore the Motherboard (Simulation) Scenario

The purpose of this lab is to help you become familiar with the motherboard and other internal components such as the power supply and internal hard drives.

Begin by opening the Motherboard view of the computer. To help you identify various components, select the motherboard and view its detailed specifications. Then answer the following questions:

• How much memory is installed in the computer?


• What is the speed of the installed processor? (To view and select the processor, remove the heat sink and fan.)


• What type of power supply is installed in the system?


• How many SATA hard drives are installed?


Open the Back view of the computer and examine the motherboard connectors. Notice which devices are currently plugged in. Then answer the following questions:

• How many additional ( unused ) USB ports are currently available on the back panel (including black USB 2.0 ports

and blue USB 3.0 ports)?


• What type of video port is currently being used for the monitor?


To view the motherboard specifications, select an area on the motherboard that does not include an installed component such as a power supply cable or memory module. Under Selected Component , open the Details window and then select the Specifications tab.

Explanation

In this lab, you will explore the motherboard and examine other internal components. You will then answer several questions:

• How much memory is installed in the computer?


• What is the speed of the installed processor?


• What type of power supply is installed in the system?


• How many SATA hard drives are installed?


• How many unused USB ports are currently available?


• What type of video port is currently being used for the monitor?


• Replace any internal components you have removed and then turn on the computer.


Complete this lab as follows:

1. View the detailed motherboard specifications: a. Above the computer, select Motherboard to switch to the motherboard.


b. Select an area on the motherboard that does not include an installed component such as a power supply cable or memory module.


c. Under Selected Component , open the Details window and then select the Specifications tab.


d. Study the Component Overview diagram to become familiar with the location of various motherboard components.


e. Close the motherboard details window and refer back to it when you need help identifying components.


a. Select one of the two memory modules near the upper-right corner of the motherboard.


b. Under Selected Component , notice that it is an 8 GB memory module.


c. Select the other memory module and notice that it is also 8 GB.


d. Answer Question 1.


a. Click and drag the heat sink and fan that is currently on top of the processor to an open area on the workspace.


b. Select the processor.


c. Under Selected Component , notice that the Intel i5 processor has a base frequency of 3.60 GHz.


d. Click and drag the heat sink and fan back on top of the processor.

e. Answer Question 2.


a. Select the power supply that is directly beneath the motherboard.


b. Under Selected Component , notice that the power supply is ATX.


c. Answer Question 3.


a. Select one of the three internal hard drives near the bottom-right corner of the system case.


b. Under Selected Component , notice that the hard drive is SATA.


c. Select another hard drive and notice that it is also SATA.


d. Select the last hard drive and notice that it is also SATA.


e. Answer Question 4.


a. Above the computer, select Back to examine the motherboard connectors.


b. In the upper-left corner of the system case, select the cable connector that is nearest to the top.


c. Notice that these two USB ports are being used.


d. Just to the right of the lower USB cable connector, notice the unused black USB 2.0 port.


e. Just below the lower USB cable connector, notice the two unused blue USB 3.0 ports.


f. To verify that these are USB ports, you may wish to drag one of the installed USB connectors into the other ports.


g. Answer Question 5.


a. In the upper-left corner of the system case, select the large cable connector.


b. Under Selected Component , notice that it is a DVI-D connector.


c. Answer Question 6.


2. Determine how much memory is installed in the computer:


3. Determine the speed of the processor:


4. Determine the type of power supply in the system:


5. Determine the number of installed SATA hard drives:


6. Determine the number of available (unused) USB ports:


7. Determine the type of video port that is currently being used for the monitor:

3.3.11 Install Memory (Demo Video) Transcript:

In this lab, you need to install some new RAM into a desktop computer. Click here to switch to the motherboard view. If we zoom in, we can see that this computer has four memory slots. Drag a memory module from the shelf to any of these slots to install it. On a real computer, you'd have to push down hard until it snaps into place, but here in the simulation it goes in nice and easy.

3.3.12 Install Memory (Simulation) Scenario

You work at a computer repair store. You're building a computer using spare parts. In this lab, your task is to install a DDR4 memory module in the computer.

• Examine the motherboard and locate the four memory slots near the upper-right corner. If necessary, zoom in or check the motherboard specifications to identify the memory slots.


• Install a single memory module in the motherboard.


Explanation

In this lab, your task is to install DDR4 memory in the computer. All DDR4 memory have a single notch on the bottom, the DDR being the farthest from the middle.

Complete this lab as follows:

1. Above the computer, select Motherboard to switch to the motherboard view.


2. Zoom in to identify the memory slots near the upper-right corner the motherboard.


3. On the Shelf, expand Memory Modules .


4. Drag the DDR4 RAM from the Shelf to one of the four DDR4 memory slots on the motherboard.


3.3.13 Upgrade a Video Card (Demo Video) Transcript:

In this lab, you want to install a new graphics card into a computer. This will help us do graphics-intensive tasks like video editing, 3D modeling, and playing high-end video games. Mostly that one.

Right now, this monitor is connected to the computer with a VGA cable. We can disconnect it by dragging the ends of the cable away. We can put the cable back on the shelf to get it out of the way.

Next, we want to remove the old graphics card, which is down here at the bottom. Drag it to the shelf.

Now we need to choose a new video card. The task instructions indicate that we need a connection designed for high- definition content. This card has two ports for DVI cables, which don't support HD. This card has a port for an HDMI cable, which does support HD. This is the card we want.

Next, we need to figure out where to plug it in. This card plugs into a PCI express slot. If we look at the motherboard documentation, we can see that the PCIe slots are labeled as number 20. On the diagram, we see that 20 points to these two blue slots. Let's drag the correct GPU to a PCIe slot on the motherboard.

Next, we need to give the card power from the power supply. Select the power supply, then scroll over to find a 6-pin connector. Zoom in to the right side of the graphics card and plug the connector into the socket.

Now that everything's connected, we can connect the computer to the monitor using an HDMI cable from the shelf. Press the power button to turn the computer on. Right-click the desktop and select Display settings. Under resolution, select 1920x1080. This resolution is also called 1080p and is used for HD content. Click Keep changes.

3.3.14 Upgrade a Video Card (Simulation) Scenario

You work at a computer repair store. A customer wants to upgrade the video card in his computer to provide more memory, faster processing power, and additional features.

He wants to be able to do the following:

• Use the computer to watch high-definition movies from a Blu-ray player.

• Connect his monitor to the computer using a connection designed for high-definition content.


In this lab, your task is to complete the following:

• Disconnect the monitor from the current video card and remove the card from the computer.


• Install the video card with the HDMI connection. HDMI is an interface used by monitors and digital televisions for high-definition content.


• Provide power to the video card by selecting the power supply and then dragging a 6-pin PCIe power connector to the power port on the right side of the video card.


• Connect the computer to the monitor using an HDMI cable.


• In Windows, configure a resolution of 1920x1080 for full HD content. Even though the monitor supports a higher resolution, this is the resolution for HD content.


On a real computer, you would need to install additional drivers and other software to take advantage of all of the hardware features available with the new hardware.

Explanation

In this lab, your task is to complete the following:

• Disconnect the monitor from the onboard video card.


• Install the video card with the HDMI connection. HDMI is an interface used by monitors and digital televisions for high-definition content.


• Provide power to the video card by connecting a 6-pin PCIe power connector from the power supply to the video card.


• Connect the computer to the monitor using an HDMI cable.


• In Windows, configure a resolution of 1920x1080 for full HD content. Even though the monitor supports a higher resolution, this is the resolution for HD content.


Complete this lab as follows:

1. Disconnect the monitor from the current video card as follows: a. Above the computer, select Back to switch to the back view of the computer.


b. Above the monitor, select Back to switch to the back view of the monitor.


c. Drag the DB-15 Connector from the computer to the Workspace area.


d. Drag the DB-15 Connector from the monitor to the Shelf.


2. Remove the current video card from the computer as follows: a. Above the computer, select Motherboard to switch to the motherboard view of the computer.


b. Drag the VGA Video Adapter from the computer to the Shelf.

3. Install a new video card as follows: a. For each video card on the Shelf, select Details .


b. Select Connectors for the video card to find the one with the HDMI connection.


c. Close the Details window.


d. Drag the HDMI video adapter from the Shelf to an open PCI Express slot on the motherboard.


4. Provide power to the new video card as follows: a. Select the power supply to provide power to the video card. The video card requires an additional PCIe power connection.


b. Under Selected Component, drag a 6-pin PCIe power connector to the power port on the right side of the video card.


5. Connect the computer to the monitor as follows: a. Above the computer, select Back to switch to the back view of the computer.


b. On the Shelf, expand Cables .


c. Select the HDMI cable .


d. Under Selected Component, drag an HDMI Connector to the HDMI port on the video card.


e. Under Selected Component, drag an HDMI Connector to the HDMI port on the monitor.


f. Above the computer, select Front to switch to the front view of the computer.


g. Above the monitor, select Front to switch to the front view of the monitor.


h. Click the power button for the computer.


a. After Windows loads, right-click the desktop and select Display settings .


b. Under Resolution, select 1920x1080 .


c. Select Keep changes .


6. Modify the screen resolution as follows:


3.3.15 Section Quiz (Section Quiz) q_itf_intcomponents_bios_01

Which of the following is responsible for verifying that all required components are operating properly before allowing the operating system to begin loading?

Answers:

• CPU


• RAM


• *BIOS


• GPU


Explanation:

The Basic Input/Output System (BIOS) chip makes sure that all required components are plugged in and working properly on bootup. If so, it then tells the operating system to start loading.

The CPU controls all other parts of a computer by getting information from them and then telling them what to do. The CPU is one of the components the BIOS checks before allowing the operating system to load.

RAM is a short-term storage location that holds instructions for programs until the CPU can execute them. RAM is one of the required components that the BIOS checks before allowing the operating system to load.

The GPU handles graphics for a computer. It is not responsible for checking other components. q_itf_intcomponents_bios_02

Your client's computer keeps attempting to boot to the network adapter. You need to change it to boot to the hard drive that has the operating system installed on it. Where would you go to change the boot order?

Answers:

• Windows Settings


• *BIOS/UEFI


• Network Settings


• Disk Management


Explanation:

A computer's boot order is configured in the BIOS/UEFI. In this scenario, the computer is set to boot from the network adapter instead of the hard drive.

Windows Settings is used to manage all sorts of configuration options in Windows. It is not used to manage a computer's boot settings.

Network Settings in Windows is used to manage network configurations. It is not used to manage a computer's boot settings.

Disk Management is used in Windows to manage disk drive configurations. It is not used to manage a computer's boot settings.

q_itf_intcomponents_chipset

Which motherboard component provides functions that might otherwise require an expansion card? Answers:

• BIOS


• *Chipset


• PCB


• I/O Ports


Explanation:

The chipset provides functions such as graphics, audio, network, and more. If the chipset does not provide a certain

function, an expansion card will need to be used.

The BIOS is a chip that makes sure all necessary parts are plugged in and working properly on bootup. It then tells the operating system to start loading.

The motherboard itself is considered a printed circuit board (PCB).

The input/output (I/O) ports on the motherboard provide connectivity for supported peripheral devices. q_itf_intcomponents_facts_01

Which of the following components stores values in short-term memory? Answers:

• *RAM


• Hard drive


• Processor


• Flash drive


Explanation:

RAM stores values in short-term memory. Hard drives store data in long-term memory.

Processors execute instructions stored in computer programs.

Flash drives are portable devices that store data in long-term memory. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_intcomponents_facts_02

Which hardware component processes data? Answers:

• *CPU


• RAM


• HDD


• SSD


Explanation:

The CPU, or Central Processing Unit, processes data. RAM stores values in short-term memory.

HDD and SDD are two types of long-term memory storage. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_intcomponents_facts_03

Which of the following components converts AC to DC? Answers:

• *Power supply


• Voltage regulator


• Capacitor


• Surge protector

Explanation:

A computer's power supply converts alternating current (AC) from the wall outlet to direct current (DC) used by the computer's internal components.

A voltage regulator is an electronic device that supplies the appropriate voltage to a processor. It does not convert the power input from one form to another; it only ensures that the voltage remains at the appropriate level for the device. A surge protector protects a system from power spikes. A UPS (uninterruptable power supply) provides backup AC power using a reserve battery.

q_itf_intcomponents_facts_04

Which of the following computer components is the MOST important part of any modern computer? Answers:

• *CPU


• BIOS


• RAM


• NIC


Explanation:

The CPU is the most important part of any modern computer system because it controls the other parts of the computer. RAM is the main memory of a computer. It can be quickly accessed by the CPU and is where the computer stores data and instructions that it is actively using.

A network interface card (NIC) is a component (sometimes built into the CPU and sometimes plugged into the motherboard) that provides network connectivity.

The BIOS makes sure all necessary parts are plugged in and working properly on bootup. q_itf_intcomponents_facts_05

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored?

Answers:

• *In memory


• In a database


• In a flat file


• In flash memory


Explanation:

Random Access Memory (RAM) is extremely fast, and the processor can read from and write to it billions of times each second. RAM is not persistent, which means if the system turns off, RAM loses everything it had stored in memory. But data persistence is not important in this scenario.

Flash memory, flat files, and databases all provide persistent storage, but much slower data access than RAM. q_itf_intcomponents_flash

For many years, computers placed data on hard drives magnetically using platters coated with an iron oxide. Modern computers are now using the more modern solid-state drives, which are faster and less prone to mechanical failures. Which component is used inside a solid-state drive to store data?

Answers:

• *Flash memory


• ROM


• RAM

• Cache


Explanation:

You can store information at higher speeds with flash memory (like RAM does), but information is not lost if the power is removed. It is considered non-volatile memory.

ROM also stores information inside chips and does not lose the information when power is removed. The difference between ROM and flash is that flash is faster.

RAM is volatile memory; it cannot retain the information once power is removed from the computer.

Cache is a much faster form of RAM, but it is located either on the motherboard or built into the CPU. It is considered volatile.

q_itf_intcomponents_fsb

What is the bus between the RAM and CPU called? Answers:

• PCI


• *FSB


• ATA


• BSB


Explanation:

The bus that connects the CPU and RAM is known as the front-side bus (FSB). The faster the speed of the FSB, the faster the CPU can receive data to process.

The peripheral component interconnect (PCI) bus transfers data from expansion cards to the CPU. The advanced technology attachment (ATA) bus transfers data from hard drives to the CPU.

The back-side bus (BSB) transfers data from the CPU to the L2 cache. q_itf_intcomponents_graphic

Which of the following tasks would benefit the MOST from a dedicated graphics card? Answers:

• Word processing


• Web browsing


• *3D animation


• Audio mixing


Explanation:

Computers that are used primarily for gaming, video editing, 3D modeling, and animation need a second GPU dedicated to graphics processing. The best dedicated graphics cards (sometimes called video cards) are expensive because they also include their own specialized RAM and cooling fan.

Word processing, web browsing, and audio mixing are not GPU-intensive tasks, so they would not benefit from a dedicated GPU.

q_itf_intcomponents_hertz

What is the number of instructions a CPU can perform per second measured in? Answers:

• Bits


• Bytes

• *Hertz


• Ohms


Explanation:

CPU cycles are measured in hertz.

Data transfer is measured in bits per second. Data size is measured in bytes.

Resistance is measured in ohms. q_itf_intcomponents_motherboard

Which of the following BEST describes a motherboard? Answers:

• *A printed circuit board that contains sockets and slots for upgradeable components


• A chip that controls all other parts of a computer by getting information from them and then telling them what to do


• A unit that supplies electricity to computer components


• A chip that makes sure all necessary parts are plugged in and working properly on bootup so that the operating system can start loading


Explanation:

The motherboard is a printed circuit board that contains sockets and slots for upgradeable components.

The CPU is a chip that controls all other parts of a computer by getting information from them and then telling them what to do.

The power supply is a unit that supplies electricity to computer components.

The BIOS is a chip that makes sure all necessary parts are plugged in and working properly on bootup. It then tells the operating system to start loading.

q_itf_intcomponents_ram_01

What can be done if a computer is relying too much on virtual memory supplied by the hard drive to temporarily store information needed by the CPU?

Answers:

• *Install more RAM.


• Re-format the hard drive.


• Upgrade the CPU.


• Install a better video card.


Explanation:

The CPU relies on RAM to store information it is currently working on. If a computer runs out of RAM space, the computer relies on virtual memory, which is located on the hard drive. The problem with this is accessing the hard disk is slower compared to RAM.

Re-formatting the hard drive will not improve performance. Installing more RAM is the best choice. Upgrading the CPU may increase performance, but more memory is a better strategy.

Installing a better video card will help the performance of some applications, but more memory is always the best choice.

q_itf_intcomponents_ram_02

Which of the following technologies allows data to be transferred between the RAM and CPU twice per cycle?

Answers:

• *DDR


• Dual-channel RAM


• SMP


• CMP


Explanation:

Double data rate (DDR) allows data to be transferred between the RAM and CPU twice per cycle. Dual-channel RAM allows data to be read from two RAM sticks simultaneously.

Symmetric multiprocessing (SMP) is an architecture that allows two or more CPUs to be connected to the same system. Chip-level multiprocessing (CMP) integrates two or more CPUs onto one chip.

q_itf_intcomponents_rj45

Which type of port is used on an NIC to connect a computer to the network with unshielded twisted-pair cables? Answers:

• RJ-11


• *RJ-45


• USB


• Serial


Explanation:

Unshielded twisted-pair (UDP) network cables use an RJ-45 connector that plugs into the NIC and connecting network ports.

RJ-11 connectors are used for phone lines.

USB is used to connect many different devices, but it is not used to connect a device to the network. Serial connectors are not used to connect unshielded twisted-pair cables to an NIC. q_itf_intcomponents_sdram

Which type of RAM runs at the same clock speed as the CPU and data bus? Answers:

• *SDRAM


• DRAM


• Static RAM


• Flash memory


Explanation:

SDRAM stands for synchronous dynamic random access memory. Synchronous means in sync, which in this case means the RAM and CPU are synchronized together.

DRAM is the original dynamic RAM. It does not run at the same rate as the CPU and data bus. Static RAM is an older type of RAM. This type of RAM was usually soldered onto the motherboard. Flash memory is used for non-volatile storage, not short-term storage.

q_itf_intcomponents_storage

One of the most important components of a computer is storage. All computers have ways to work with and store data. When a computer manipulates data, it places it in a short-term storage location. When a computer stores data, it is placed

in a long-term storage location. What are the two terms we use for a short-term and long-term storage location? (Select two.)

Answers:

• *Volatile storage


• *Non-volatile storage


• Cache


• The cloud


• Flash


Explanation:

RAM, or random access memory, is considered volatile memory. RAM is extremely important as it is where the central processing unit (CPU) stores the information it is currently working on. The CPU can store and retrieve data from RAM at high speeds. The only issue with RAM is when the power is removed from the computer, all data is lost, hence the term volatile memory.

Non-volatile storage is a place to put data to keep it from being lost if power is removed from the computer. Devices that fall under this title are a computer's hard drive, CD-ROMs, ROM chips, and flash drives.

Cache is a form of volatile memory that is used by the CPU. The difference between cache memory and RAM is that cache is usually built into the CPU and runs at the same clock speed. Cache memory is made of a more expensive material then standard RAM.

The cloud is a non-volatile place to store your data, but it is not considered part a computer's component. Flash memory is a form of non-volatile memory; it does not lose data when there is no power to the device. q_itf_cputypes_01

Which of the following companies is a manufacturer of CPUs? Answers:

• nVidia


• Apple


• DELL


• *Intel


Explanation:

Intel is one of the biggest manufacturers of CPUs along with AMD. nVidia is known for making graphic processing units (GPUs).

Apple and DELL both make computer systems but not the hardware inside of them. q_itf_cputypes_02

Which CPU type would MOST LIKELY be found in a smartphone? Answers:

• *ARM


• x86


• x64


• IA-64

Explanation:

Most tablets and smartphones use ARM processors. ARM processors use a reduced instruction set, which means they can't do as many things as x86 processors can.

x86 processors are 32-bit CPUs used in computer systems. x64 processors are 64-bit CPUs used in computer systems.

IA-64 processors were special CPUs developed by Intel that were only used in servers. q_itf_cputypes_32-bit_01

You are upgrading your computer system by adding more RAM. You purchase two 4GB sticks of RAM and install them on your computer. After booting up the system, you find that only 4GB is recognized. Which of the following is the MOST likely reason for this?

Answers:

• The computer is a 64-bit system.


• *The computer is a 32-bit system.


• You are using Windows 7.


• You are using Windows 10.


Explanation:

The most likely reason why the computer is only recognizing 4GB of RAM is that the computer is a 32-bit system. 32- bit systems only recognize up to 4GB of RAM and no more.

A 64-bit system can recognize and use up to 256TB of RAM or more.

Both Windows 7 and Windows 10 recognize and use more than 4GB of RAM if they are 64-bit systems. q_itf_cputypes_32-bit_02

You are attempting to install a 64-bit version of a program but keep getting an error message that the software is not compatible with your computer. Which of the following is the MOST likely reason for this?

Answers:

• *The computer is a 32-bit system.


• The computer is a 64-bit system.


• You have an AMD CPU installed.


• You have an Intel CPU installed.


Explanation:

The most likely reason why a 64-bit program would not be compatible is that the computer is a 32-bit system. A 32-bit system is unable to run 64-bit software, while a 64-bit system is able to run 32-bit software.

The brand of CPU would not matter in this scenario. q_itf_cputypes_64-bit

Which of the following statements is true regarding modern workstations, servers, and premimum smartphones and tablets?

Answers:

• 4 GB is the standard amount of RAM


• 32-bit CPUs are the standard


• *64-bit CPUs are the standard


• ARM CPUs are the standard

Explanation:

Most workstations, servers, and premium smartphones and tablets come with 64-bit processors today. Some lower end devices might still come with a 32-bit processor, but these are being faded out.

ARM CPUs are not used in workstations and servers.

Most of these devices come with more than 4 GB of RAM. q_itf_cputypes_ryzen

Which of the following CPU models is made by AMD for high-end computer enthusiasts? Answers:

• Epyc


• *Ryzen Threadripper


• Atom


• Xeon


Explanation:

AMD's Ryzen Threadripper CPU models are manufactured by AMD for high-end computer enthusiasts. Epyc is AMD's CPU brand for servers.

Atom is Intel's CPU built for low-power portable devices. Xeon is Intel's CPU brand for servers. q_itf_cputypes_tegra

Which of the following CPU types does Nvidia's Tegra fall under? Answers:

• Zen


• Core


• *ARM


• Xeon


Explanation:

Nvidia's Tegra CPU is an example of an ARM CPU. Zen is AMD's CPU microarchitecture.

Core is Intel's CPU microarchitecture. Xeon is Intel's server CPU. q_itf2_motherboards_dsp

Which of the following chips is responsible for processing audio input from a microphone and converting it into data? Answers:

• CPU


• *DSP


• GPU


• DLP


Explanation:

The digital signal processor (DSP) chip is responsible for converting data and outputting it into a signal for the speakers.

It converts audio input from a microphone into data the computer can read.

The CPU, or central processing unit, is the most important component of a computer system. Just like your brain, the CPU performs complex computations that turn raw data from the environment into useful information.

The GPU is an additional computer processor that provides graphics processing, giving better performance by relieving the CPU of this duty.

Digital light processing (DLP) is a display technology often used in projectors. DLP devices use mirrors that can be adjusted with the light source and color filters to display the correct image.

q_itf2_motherboards_fiber

Which type of cable would be used to transfer audio signals using light? Answers:

• Coaxial


• UTP


• STP


• *Fiber optic


Explanation:

Fiber optic cables are used to transfer data using light.

Coaxial, UTP, and STP cables are all copper-based cables that transfer data using electrical signals. q_itf2_motherboards_jacks_01

Which of the following colored jacks on an audio card would you use to connect a 5.1 speaker set? Answers:

• *Lime


• Light blue


• Pink


• *Black


• *Orange


• Silver


• Brown


Explanation:

To connect a 5.1 speaker set, you would use the lime, black, and orange jacks. Lime - Audio out for the main stereo speakers

Light blue - Audio in jack used for tape decks, CD players, tuners, etc. Pink - Audio in jack used for microphones

Black - Audio out jack used for rear stereo speakers

Orange - Audio out jack used for center channel and subwoofer

Silver - Audio out jack used for side-channel speakers on a 7.1 speaker configuration Brown - Audio out jack used for a special panning right-to-left speaker q_itf2_motherboards_jacks_02

Which of the following colored jacks on an audio card would you connect a microphone to? Answers:

• Lime

• Light blue


• *Pink


• Orange


Explanation:

The pink audio jack is used to connect a microphone. Lime - Audio out for the main stereo speakers

Light blue - Audio in jack used for tape decks, CD players, tuners, etc. Pink - Audio in jack used for microphones

Black - Audio out jack used for rear stereo speakers

Orange - Audio out jack used for center channel and subwoofer

Silver - Audio out jack used for side-channel speakers on a 7.1 speaker configuration Brown - Audio out jack used for a special panning right-to-left speaker. q_itf2_motherboards_rca

You are connecting your new 5.1 speaker set to your computer. The speaker set uses coaxial cables to plug into an S/PDIF jack. Which type of connection is MOST likely being used?

Answers:

• Fiber optic


• *RCA


• RJ-45


• Serial


Explanation:

RCA connectors are used with coaxial cables to connect to an S/PDIF jack.

Fiber optic cables use a special type of connector to connect to a light-based S/PDIF jack. RJ-45 connectors are used with network cables.

Serial connections come in many different shapes and configurations but would not be used to connect to an S/PDIF jack.

t_3.3.9-New_Question_1

Which of the following slots would a new graphics card MOST likely be inserted into? Answers:

• PCI


• USB


• *PCIe


• NIC


Explanation:

Due to the high speeds and throughput needed by modern graphic cards, a PCIe slot would be used when installing a new graphic card.

A PCI slot is used for legacy expansion cards or expansion cards that do not require a high throughput. USB is used for external devices and would not be used by a graphics card.

An NIC is a network interface card and is used for network connections.

3.4 Input and Output

Section Introduction

As you study this section, answer the following questions:

• How are input and output similar on desktop computers and mobile devices? How are they different?


• How many ways can you input information into your computer?


• How many ways can you output information from your computer?


In this section, you will learn to:

• Identify common peripheral devices by sight.


• Identify common ports and connectors by sight.


• Connect cables and peripherals to a computer system.


• Select appropriate cables and hardware devices for a given scenario.


• Troubleshoot common problems when installing external devices to a computer system.


• Identify the proper cable to connect a computer to an Ethernet port.


• Set up a desktop computer system, including peripherals, power cables, and networking cable.


• Describe how touchscreens are used as input devices.


• Choose the most appropriate printer for a given scenario.


• Describe how a camera works.


Key terms for this section include:

Term Definition


Peripheral

A device, usually external to a computer, that is plugged into a computer's


Touch screen

A display device that allows a user to interact with a computer by touching,


Inkjet printer

A printer that sprays small dots of ink from an ink reservoir onto a sheet of paper.


Laser printer

A printer that us


Scanner

A device that scans paper documents and converts them into digital files.


Universal Serial Bus (USB)

A common interface used to connect peripherals, such as mice, keyboards, FireWire

An interface used to connect peripherals such as digital cameras and external


Video Graphics Array

A connector, identified by its blue color and three rows of pins, that is used to


Digital Visual Interface

A connector, typically white with three ro


High

A connector now available on a wide variety of devices such as computers,


Registered Jack 45 (RJ

A connector used to connect a computer to a wired network.


Thunderbolt

An interface primarily used on Apple computers that connects a monitor to a


Infrared

A communication technology that uses light waves to transmit information


Bluetooth A short


Camera lens

A camera component that focuses the light that enters it into a point. Behind the


Photosensitive material

A light sensitive surface used to capture the image focused by the lens.


Camera shutter

A camera component that sits between the lens and the sensor, allowing light to


3.4.1 Input/Output Hardware (Lesson Video) Transcript:

The word hardware refers to the physical components of a computer. The main functions of computer hardware are input, output, processing, and storage. In this video, we'll focus on input and output hardware associated with desktop computer systems. These are commonly referred to as peripheral devices.

Peripheral devices are used to expand or customize the functionality of a computing device. They usually connect to your computer through an external port or through a wireless connection. Even after the system has been set up, you can still add or remove peripheral devices as necessary.

Input devices allow you to send data or commands to the computer. There are several types of input devices. The first one is a keyboard.

A keyboard allows you to send alphanumeric information to the system by pressing keys. When you press a key, the corresponding character is sent to the computer hardware. The software running on the system then does whatever it has been programmed to do with that keystroke.

External keyboards are required for desktop systems but are optional for laptop and mobile devices, which use integrated keyboards or on-screen keyboards. For desktop and laptop systems, keyboards typically connect using a USB port, but they can also be connected wirelessly. External keyboards can be connected to mobile devices as well, using a wireless connection.

Another type of input device is the mouse. The hardware within the mouse is able to keep track of its physical location

on a hard surface. Using this information, it can determine how far you have moved the mouse and in what direction. This information is sent to the computer, which moves the cursor on the screen accordingly.

An external mouse can be connected to a desktop or laptop using a USB port or a wireless connection.

A related type of input device is the touch screen, which is commonly used by mobile devices. A touch screen uses a special material overlaid on the top of the device's regular screen that can detect when you have touched it and where. As with a mouse, touch screens can be used to send data and commands to the device.

Scanners can be connected to a computer to allow you to scan paper documents into digital files. Scanners can be connected to desktops or laptops using a USB or FireWire connection. Wireless scanners are also available.

Digital cameras and web cams can be connected to computers to input digital images and video into the system. These devices are commonly connected to desktops and laptops using a USB, FireWire, or wireless connection. Mobile devices already include integrated cameras, so they are not commonly used with external digital cameras and web cams.

To record audio, a microphone can be connected to a desktop system using a USB connector, an audio jack, or a wireless connection. Laptops and mobile devices already have integrated microphones and are less likely to have an external microphone attached.

Computers use output devices to display or send information.

The mostly common type of output device is the monitor. Information is usually displayed on a monitor screen as it's being processed by the computer. Laptop and mobile devices use an integrated screen, while most desktop systems use an external monitor connected to a video port.

Another type of output is audio. Modern computing devices can send audio output to a set of speakers, which may be integrated into the device itself or plugged into an external connector.

On a desktop system, speakers can be connected using a USB cable, an audio jack, or a wireless connection. Frequently, we need to create a hard copy of the information processed by the computer. This is done using a printer.

Data is sent through a wire or over radio waves to a printer. The printer receives the data, formats it, and transfers it onto a piece of paper.

Printers are commonly connected using a USB port, a FireWire port, or a network connection.

In this video, we introduced computer peripherals and how they connect to a computer system. Input devices allow us to send data and commands to the computer. Output devices display and transmit information that has been processed by the computer.

3.4.2 Input/Output Hardware Facts

The main functions of computer hardware are input, output, processing, and storage. Peripheral devices are used to provide or customize these hardware functions. Even after the system has been set up, you can still add or remove peripheral devices as necessary.

• On desktop computers, peripheral devices connect to the computer through external ports or by using a wireless connection.


• On mobile devices, such as laptops and tablets, these peripheral devices are usually built-in.


This lesson covers the topic of common peripheral devices. Common Peripheral Devices

Many types of peripheral devices can be connected to a computer. The following table describes some of the most common ones.

Table 1: Common Peripheral Devices Device

Description


Keyboard

Computer keyboard.

A keyboard allows you to send alphanumeric information to the system by


Mouse

Computer Mouse.

The hardware within the mouse can keep track of its


Touch Screen Smartphone.

Touch screens are commonly used by mobile devices. A touch screen uses a


Scanner Scanner.

Scanners can be connected to a computer to allow you to scan paper


Digital Camera Digital Camera.

Digital cameras and webcams can be connected to input digital images and

Microphone Microphone headset.

To record audio, a microphone can be connected to a desktop system using


Monitor

Computer monitor.

The most common type of output device is the monitor. Information is usually


Speakers Speakers.

Another type of output is audio. Modern computing devices can send audio


Printer Printer.

You use a printer to create a hard copy of the information processed b


Digital Projectors Digital Projector.

In today's world there is often a need to project images from a computer to a


3.4.3 External Device Interfaces (Lesson Video) Transcript:

Computers use a variety of interfaces to connect external devices. In this video, we'll learn about some of the most common types of ports, connectors, and wireless methods for connecting devices.

The most commonly used type of connector is the Universal Serial Bus, or USB connector. USB allows you to connect a variety of external devices, including printers, digital cameras, external hard drives, and smart phones. USB ports and connectors come in four shapes: Type A connectors are rectangular in shape. They are designed for connections that may be plugged and unplugged frequently.

Type B connectors are more squared in shape with a bevel on one edge to keep them from being plugged in backwards. They are designed to be used for connections that are left plugged in for long periods of time.

Mini USB connectors are a smaller type of USB connector. They are commonly used for devices such as digital cameras.

Micro USB connectors are even smaller still. They are commonly used for connections to mobile devices, such as tablets and phones.

Most computer systems have 2-6 USB ports, allowing you to connect that many devices to the system. If you need to connect additional devices, you can expand the system by connecting a USB hub to one of these ports. A USB hub allows you to connect additional USB devices through just one port on the computer.

Some computers provide a FireWire connector. It looks a lot like a USB connector, but it's beveled on one end to keep you from inserting the cable incorrectly. FireWire functions in much the same manner as USB, allowing you to connect external devices, such as digital cameras, extra hard drives, and scanners to the computer system.

Most computers also provide audio connectors like these. The blue one is the line in connector, which can be used to connect an external audio source to the computer. The green one is the line out connector, which is used to connect speakers to the system. The pink one is the microphone jack, which is used to connect a microphone to the system. Computers also provide video connectors, which are used to connect an external monitor to the system. The following types of video connectors are commonly used:

The Video Graphics Array, or VGA connector, is used to connect older monitors to the system. You can identify this connector by its blue color and the three rows of five pins.

The Digital Visual Interface, or DVI connector, is typically white with three rows of eight pins.

DVI has been superseded by the High-Definition Multimedia Interface, or HDMI connector, which is used to connect the system to an HDMI monitor or TV.

Like HDMI, the DisplayPort and Mini DisplayPort interfaces are used to send high-quality, digital video and audio signals. The main difference is that HDMI is beveled on two corners, and DisplayPort is only beveled on one.

The Thunderbolt interface is compatible with DisplayPort and is primarily used on Apple computers. Thunderbolt ports can also provide DC power. They are mainly used for external displays, but they can also be used to connect other peripheral devices.

Most computers provide a connector that allows you to connect the system to a network. This network connector is called a Registered Jack 45, or RJ-45 jack. To connect this system to a network, plug a network cable into this connector. Computers can also connect to external devices using wireless communication.

Infrared (IR) communication technology uses light waves to transmit information through the air. The light used by IR devices is just past the visible red light spectrum, so it's invisible to us.

The simplest example of an IR device is a TV remote. When you press a button on a TV remote, IR light is emitted from the front of the remote and picked up by an IR receiver on the TV. Infrared is used by some portable devices such as tablets and smart phones. However, because of its line of sight and distance limitations, most devices use Bluetooth to communicate wirelessly.

Bluetooth is a short-range wireless communication technology used by many devices. It uses radio waves that operate between 2.4 and 2.485 GHz. Most Bluetooth devices have a range of about 30 feet.

The nice thing about Bluetooth is that it's able to operate without a direct line of sight between devices. There can even be some obstructions between devices such as thin walls. This versatility has made Bluetooth the short-range communication method of choice for devices like wireless headphones, speakers, keyboards, mice, smart watches, printers, and game controllers.

In this lesson, you learned about common computer ports and connectors. USB and FireWire connectors are used to connect external devices to the system. Audio connectors are used to connect speakers and microphones to the system. Video connectors are used to connect monitors to the system. Network connectors are used to connect the system to a network. We ended the video by comparing infrared and Bluetooth wireless technologies.

3.4.4 Installing External Devices (Lesson Video) Transcript:

Installing external devices to a PC or a laptop is usually straightforward. You plug the device into an open port and then wait a few seconds for the computer's operating system to recognize the device and install the software needed to communicate with it. The term "plug-and-play" applies to these easy installations. Sometimes, however, installing external devices can be a bit more complicated. In this video, we'll provide installation tips for common scenarios.

USB devices are hot-swappable. This means you can plug and unplug USB peripherals while the system is running. The system will automatically detect the addition or removal of a device and make the necessary configuration changes.

Before disconnecting external storage devices, you need to 'stop' them properly before removing them to prevent data corruption.

USB devices can be plugged in directly to a USB port on the computer or to an external USB hub that's connected to the computer.

USB ports can provide power over the connection. USB devices can receive up to 500 mili-amps of power from a USB

2.0 port and up to 900 mili-amps of power from a USB 3.0 port. If a device can operate on this much power, it's considered a bus-powered device, which means the USB port provides 100 percent of its power.

If a device needs more power than this, then it's considered a self-powered device and will typically have an external power adapter that plugs into a wall outlet.

For some peripheral devices, you may need to load drivers before connecting the device for the first time. Drivers contain software instructions that the computer needs in order to communicate with the device. For many devices, the necessary drivers are included with the operating system. Other devices may require you to manually install the drivers on the system prior to the first connection.

Device drivers may also need to be updated when manufacturers fix bugs and vulnerabilities.

If your computer has access to a local network, either wired or wireless, you might install and configure peripherals to be accessed over the network. For example, you might install an Internet Protocol or IP-based printer and then configure it using a web page in a browser. Another example would be a Wi-Fi access point.

If you install an external device and it's not functioning correctly, consider the following troubleshooting tips:

* Check all cables and connectors to make sure they're securely seated.

* If the device requires a separate power source in order to operate, verify that it's plugged in.

* If you're installing the device on Windows, open Device Manager and make sure the device is listed and enabled.

* Try installing the device on another computer system to make sure the problem doesn't lie with the device itself.

* Update the device driver.

* If you've recently updated the device driver and the device no longer works, roll back the driver to the previous version or revert the operating system to an earlier restore point.

In this video, we talked about installing external devices to a computer system. We discussed plug-and-play installations, updating device drivers, working with IP-based peripherals, and configuring a Web-based installation.

3.4.5 External Device Facts

This lesson covers the following topics:

• Computer connection types


• External device installation tips


• Troubleshooting tips


• Data transfer speeds


Computer Connection Types

Computers use a variety of interfaces to connect external devices. Common computer connectors that you should be familiar with are described in the following table.

Table 1: Computer Connection Types Port/Cable

Common Device(s)


USB Type A

USB Type A connector.

Universal Serial Bus (USB) Type A connectors are rectangular in shape.


USB Type B

USB Type B connector.

USB Type B connectors have a square shape with a bevel on one edge to


USB Type C

USB Type C connector.

The USB Type C specification was introduced in 2014. It is simpler than


Mini USB

Mini USB connector.

Mini USB connectors are a smaller type of USB connector. They are


Micro USB

Micro USB connector.

Micro USB connectors are the smallest type of USB connec


FireWire

FireWire connector.

Some computers provide a FireWire connector. FireWire is an IEEE 1394


Audio Microphone plug.

Microphone, line-in, and line-out audio jacks. Most computers provide audio c


VGA Video VGA connector.

The Video Graphics Array (VGA) connector is designed for analog signals VGA:

640 x 480 resolution

16 colors SVGA:


XGA:


DVI Video DVI connector.

The Digital Visual Interface (DVI) connector is designed to connect digital


HDMI

HDMI connector.

The High


RJ-45

RJ-45 jack.

RJ-45 connector.

Most computers provide a Reg

DisplayPort/Mini DisplayPort DisplayPort.

DisplayPort connectors have 20 pins and come in two sizes: the standard


Thunderbolt Thunderbole connector.

The Thunderbolt (TB) interface is compatible with DisplayPort and is


Infrared

Infrared (IR) communication technology uses light waves to transmit


Bluetooth Bluetooth is a short


External Device Installation Tips

Installing external devices to a PC or a laptop is usually straightforward. You plug the device into an open port and then wait a few seconds for the computer's operating system to recognize the device and install the software needed to communicate with it. The term plug-and-play applies to these easy installations. However, installing external devices can be a bit more complicated. For example, if plug-and-play is not an option or if it isn't working correctly, you may need to obtain the required software drivers from the manufacture and install them manually. Below are some installation tips for common scenarios.

Table 2: External Device Installation Tips Device

Installation Tips


USB

USB devices are hot


Sel

USB ports can provide power over the connection. USB devices can receive up to 500


Drivers

For some peripheral devices, you may need to


Network

If a computer has access to a local network, either wired or wireless, you might install and


Troubleshooting Tips

In a Windows environment, many external peripherals can be managed using the Windows Setting app or Control Panel. This includes such things as configuring extra buttons available with some mice or keyboard settings.

If you install an external device and it's not functioning correctly, consider the following troubleshooting tips:

• Check all cables and connectors to make sure they're securely seated.


• If the device requires a separate power source in order to operate, verify that it's plugged in.


• If you're installing the device on Windows, open Device Manager and make sure the device is listed and enabled.


• Try installing the device on another computer system to make sure the device works correctly.


• Update the device driver.


• If you've recently updated the device driver and the device no longer works, roll back the driver to the previous version or revert the operating system to an earlier restore point.


Data Transfer Speeds

The following table list data transfer rates for USB and FireWire devices. Table 3: Data Transfer Speeds

Device

Data Transfer Rates


USB

USB speeds depend on the type of USB port. As might be expected, older versions have slower USB 1.0:

12 Mbit/s


USB 2.0:


USB 3.0:


USB 3.1:


USB 3.2:


USB 4:


FireWire

New versions of FireWire increase the number of pin connectors. The number of pin connectors

FireWire 400 (IEEE 1394):

400 Mbit/s

6 connectors; called an alpha connector FireWire 800 (IEEE 1394b)


FireWire S1600 (IEEE 1394c):


3.4.6 Touchscreens

Over the past few decades, touchscreen technology has grown from a novelty used only by the wealthy to one of the most common computer interfaces (there's a good chance you've already used a touchscreen today). As touchscreens become cheaper to manufacture and distribute, they'll become even more ubiquitous. This lesson will compare two common types of touchscreen technologies: resistive and capacitive.

Resistive Touchscreens

As their name implies, resistive touchscreens rely on the resistance, or pressure, that's applied to the screen itself. They consist of two thin layers of transparent material. The top layer is made of flexible plastic film, and the bottom layer is typically made of glass. Each of these layers is coated in indium tin oxide, which is a transparent material that conducts electricity. The layers are kept apart by tiny bumps called spacer dots, which prevent the top layer from sagging and creating false touches.

When a user presses on the touchscreen with a finger or stylus, the flexible top layer bends down and touches the glass layer. This creates a change in voltage at a specific coordinate on the screen, which the computer can then interpret as an input.

Resistive Touchscreen Cross Section


A stylus pressing onto a touchscreen showing how a resistive touchscreen cross section works. Illustration. Capacitive Touchscreens

Capacitive touchscreens take advantage of the fact that the human body naturally conducts electricity. They consist of a piece of glass coated with a thin layer of indium tin oxide. Electrodes at the corners of the screen maintain a constant voltage over the conductive layer whenever the device is powered on. When a conductive finger touches the screen, it creates a change in voltage. Sensors under the screen detect the location of the change, which the computer translates into instructions. Smartphones typically use capacitive touchscreens.

Capacitive Touchscreen


A pointer finger and a lightning bolt pressing onto a touchscreen to showing how a capacitive touchscreen works. Illustration.

Advantages

The following table compares advantages of restrictive and capacitive touchscreens. Keep in mind that each technology's advantages correspond to the other technology's disadvantages.

Table 1: Resistive vs. Capacitive Touchscreens Resistive

Capacitive


Cheaper to manufacture Sharper images

Fewer accidental touches Sensitive to light touch


Can sense any object touching the screen Better multi-touch sensing


Better survival against heat and water Better survival against rough handling


Uses

Workers in many industries, such as manufacturing and medicine, are required to wear gloves. Since resistive touchscreens can sense any object that touches with enough pressure, they're ideal for these situations. Additionally, their hardiness against heat and water makes them a good fit for outdoor applications, such as kiosks and ATMs.

Most modern personal devices, such as phones and tablets, use capacitive touchscreens. These offer better image clarity and increased sensitivity, as well as multi-touch functionality like two-finger pinch and zoom.

3.4.7 Printers (Lesson Video) Transcript:

The role of a printer is to accept text and graphic output from a computer system and transfer that information onto a piece of paper.

Printers vary greatly in size, speed, quality, and cost. When selecting a printer, you need to take the following factors into consideration to identify the printer that best fits the way it will be used.

First, Size. Is the work area large or small? Second, Capacity. Will many people share the printer, or will it be used by only one person? Third, Speed. Do you need to print a lot of documents, or do you just need to print occasionally?

Fourth, Sophistication. Do you need high-quality graphic output, or will you just be printing text? Finally, Cost. How much can you afford to spend on a printer?

Using these factors, you can make an informed decision as to what type of printer you need.

There are many different types of printers to choose from. Let's look at two of them: Inkjet printers and Laser printers. Inkjet printers work by spraying small dots of ink from an ink reservoir onto a sheet of paper. Inkjet printers produce good quality output and are inexpensive to purchase. However, they have several disadvantages. Replacement ink cartridges are expensive and can only print around 400 pages. Additionally, ink tends to blend into the paper, causing jagged edges, and it tends to fade over time.

Laser printers use a different type of printing technology than inkjet printers. They form characters and images by using electrical charges to fix tiny plastic particles, called toner, to a page.

Laser printers have several advantages over inkjet printers. Their print output is better, they can print faster and handle more print jobs, toner is less expensive than ink, their output doesn't fade over time, and toner doesn't bleed into the paper.

The two main disadvantages to laser printers are that they are more expensive to initially purchase and they are more complex to maintain.

In this lesson, we talked about two types of printers that you may encounter and discussed their benefits and drawbacks.

3.4.8 Printer Facts

Printers receive text and graphic output from a computer and transfer it onto a piece of paper. Printers vary greatly in size, speed, quality, and cost. When selecting a printer, consider the following factors so you can identify the best printer for a given application:

• Physical size


• Printing capacity


• Printing speed


• Print quality


Using these factors, you can make an informed decision as to what type of printer you need. While there are many different types of printers to choose from, the two most common types are described in the following table:

Table 1: Common Printer Types Printer

Description


Inkjet

Inkjet printers spray small dots of ink from an ink reservoir onto a sheet of paper. Inkjet printers can produce high- quality output and are relatively inexpensive to purchase. However, they have several disadvantages.

• Replacement ink cartridges are expensive.


Printer Description


• Ink cartridges have limited print capacities.


• The ink tends to bleed into the paper.


• Prints tend to fade over time.


• The ink will run if it gets wet, unless special water-resistant ink is used.


Laser

Laser printers use electrical charges and heat to fuse tiny plastic particles (called toner ) to the paper. Laser printers have the following advantages over other types of printers:

• They produce higher-quality print output.


• They can print documents much faster.


• They are ideal for large volume print jobs.


• Replacement toner cartridges are more economical than inkjet cartridges.


• They are better suited for sharing over a network.


• The ink is waterproof and doesn't fade.


• The output doesn't bleed into the paper.


Laser printers have the following disadvantages:

• They are more expensive to purchase.


3.4.9 How Cameras Work (Lesson Video) Transcript:

For most of human history, pictures were created by artists. If you wanted a portrait of yourself, you had to commission a painter to make one for you. However, everything changed in the mid-1800s when scientists learned how to use a box called a "camera obscura," Latin for "dark room," to create permanent photographs. Since then, cameras have become increasingly common, to the point that you probably have a camera in your pocket right now. However, even modern cameras use the same principles as the original camera obscura.

When you think about it, the only thing you've ever seen is light. We don't see things; we see light reflecting off of things. Our eyes take in some of that light and focus it onto our retinas, which send information about the light to our brains. Just like our eyes, a camera's job is to capture light. Normally, light bounces all around in every direction. To make the light focus into a specific image, cameras use a glass lens. Lenses takes advantage of the fact that light bends when it travels through different materials, such as air, water, and glass. This is how projectors work – a lens magnifies the light that goes through it until it's the same size as a movie screen.

Camera lenses work the other way. They focus all the light that enters them into a point. Behind the point, the light spreads out again, eventually creating an upside-down image of the light that entered the lens.

Of course, cameras don't want to simply focus an image – they want to capture it. They do this by projecting the upside- down image onto a light-sensitive surface. Before digital photography, they used thin plastic film covered in microscopic silver halide crystals. These crystals undergo a chemical reaction when exposed to light. Crystals that are hit by more light react more strongly, producing darker spots on the film. This results in a negative image, which can then be reversed and printed on paper.

Today's digital cameras use an electronic light sensor instead of film. These sensors are covered in millions of tiny photoreceptors, which calculate the amount of light that hits them and store it as digital data.

So far, we have a lens that focuses light onto a photosensitive material. However, there's still a vital piece missing. Cameras don't want to capture light over a long period – they only want the light from a small moment in time. That's the job of the shutter, which sits between the lens and the sensor, blocking the light. When the photographer presses the button to take a picture, the shutter opens, letting light hit the sensor, then closes again. We've slowed it down here, but most camera shutters only open for a tiny fraction of a second.

In this video, we've learned about cameras. Cameras have three main parts that work together to make photographs: The lens, photosensitive material like film or digital sensors, and the shutter.

3.4.10 Connect a Monitor (Demo Video) Transcript:

In this scenario, you've just purchased a new desktop computer. Before you can use it, you need to set up the components and plug them in correctly.

First, add the monitor to the workspace. On the shelf at the left side of the screen, open the Monitors menu. Drag the monitor to this space until you see a yellow outline, then release the mouse.

Now that the monitor's in place, you'll need to connect it to the computer with an HDMI cable. First, switch the monitor and the tower to the back view by using these buttons. Then, open the cables menu and click the HDMI to HDMI cable. If you want to see greater detail, zoom in on the back of the monitor by using the scroll wheel on your mouse. Drag one of the unconnected ends of the cable to the HDMI port on the monitor. Use the mouse wheel to zoom out, then zoom in on this panel on the back of the tower. Drag the other end of the cable to the HDMI port on the tower.

Next, we need to plug the monitor into a power outlet. Zoom out with the mouse wheel, then click the AC Power Cable on the shelf. Drag the female end of the cable to the port on the back of the monitor, then drag the male end to an available space on the power strip.

Finally, turn the system on. Use the Front buttons to switch to the front view of the monitor and tower. Zoom in, then click both of these power buttons. Your system is now ready to use.

3.4.11 Connect a Monitor (Simulation) Scenario

You have just purchased a new desktop computer to be used for schoolwork. To finish setting up your new system, you

need to connect the monitor to the back of the computer. Complete the following tasks:

• Add the monitor to the Workspace.


• Use the HDMI video cable to connect the monitor to the computer.


• Connect the power cord to the monitor and then plug it in.


• Turn on the monitor and the computer.


Once you have completed these tasks, feel free to explore the hardware and operating system interfaces within the lab. Click Score Lab when you are finished.

To get a score of 100% on the lab, make sure that all components are still connected and turned on before clicking the Score Lab button.

Explanation

Complete the following steps:

1. To add the monitor to the Workspace, expand the Monitors category on the Shelf.


2. Drag the monitor from the Shelf and drop it onto the Workspace.


3. To connect the monitor to the computer, switch to the back view of both objects. o Click the Back button above the monitor.


o Click the Back button above the computer case.


4. On the Shelf, expand the Cables category.


5. Select the HDMI to HDMI cable.


6. In the Selected Component window, select a connector on the HDMI cable. Drag the connector to the HDMI port on the back of the computer.


7. In the Selected Component window, select the unconnected connector on the HDMI cable. Drag this connector to the HDMI port on the back of the monitor.


8. To plug in the monitor, select the AC power cable on the Shelf.


9. Drag the cable from the Shelf and drop it onto the AC power port on the back of the monitor. Select the female connector.


10. In the Selected Component window, select the male AC power connector. Drag this connector to the unused power port on the wall plate.


11. Switch to the front view of the monitor and the computer. o Click the Front button above the monitor.


o Click the Front button above the computer case.

12. Click the power button on the monitor.


13. Click the power button on the computer. The computer starts up and you are automatically switched to the startup screen view on the monitor. o Explore the capabilities of the operating system simulator by either running File Explorer or the Settings app.


o Open File Explorer by clicking the icon in the bottom task bar.


o Open Settings by clicking the Start button and then Settings .


o To switch back to the hardware view, click the Zoe Office hardware icon in the upper left corner of the screen.


14. Click the Score Lab button to finish the lab and see the score report.


3.4.12 Install Peripherals (USB Devices) (Demo Video) Transcript:

In this scenario, you need to attach several peripheral devices to a computer with USB cables. First, use the back button to view the back of the computer tower. Using the scroll wheel on your mouse, you can zoom in and out of items in the workspace. This computer has two available USB ports: here and here.

First, we'll add a mouse to the system. Open the Input Devices menu on the shelf, drag the mouse out to the workspace until you see a yellow outline, then release. With the mouse selected, drag the USB A connector to one of the available ports.

Now we want to connect a scanner and a video camera to the system. Unfortunately, there is only one available USB port. To solve this problem, we'll add a USB hub, which allows multiple devices to connect to a single port. Open the hubs menu on the shelf and, just like the mouse, drag it over to the workspace. If we zoom in, we can see that this hub has four available ports on the front. On the back, we can see a Mini USB port. This is the port we'll use to connect the hub to the system.

Open the cables menu and select the A to Mini USB cable. The two ends of the cable appear at the bottom of the screen. Drag the mini connector to the mini port on the hub, then plug the type A connector to the available port on the back of the tower.

Now we can switch the hub back to the front view and use it to connect our scanner and camera. Let's do the camera first. If we zoom in, we can see that the camera has a Mini USB port. Select another A to Mini cable from the shelf. Drag the Mini connector to the port on the camera and the type A connector to an available port on the hub.

Finally, let's connect the scanner. If we switch to the back view and zoom in, we can see a type B USB port. Select the A to B cable from the shelf. Drag the type B connector to the port on the back of the scanner. Then, drag the type A connector to an available port on the hub.

That's it! The mouse, camera, and scanner are all connected to the system.

3.4.13 Install Peripherals (USB Devices) (Simulation) Scenario

You recently purchased a new mouse, digital video camera, and scanner. You need to connect them to your computer, but it doesn't have enough USB ports. You need to install a USB hub to provide enough connections for these devices. Complete the following tasks:

• Connect the mouse to the computer.


• Add the USB hub to the Workspace and then connect it to the computer.


• Connect the scanner to the USB hub.


• Connect the video camera to the USB hub.

Explanation

To complete this lab:

• Connect the mouse to a USB port on the computer.


• Connect the USB hub to the computer, using a mini-USB cable. Plug the B end into the back of the USB hub and the A end into the computer.


• Connect the scanner to the hub, using a standard A/B cable. Plug the B end into the back of the scanner and the A end into the front of the USB hub.


• Connect the digital video camera to the USB hub, using a mini-USB cable. Plug the mini connector into the camera and the A end into the front of the USB hub.


Complete the following steps:

1. Switch to the back view of the computer.


2. On the Shelf, expand the Input Devices category. Select the mouse.


3. In the Selected Component window, select the USB connector on the mouse. Drag the connector to a USB port on the back of the computer.


4. To connect the USB hub, expand the Hubs category on the Shelf.


5. Drag the USB hub onto the Workspace.


6. Switch to the back view of the USB hub.


7. On the Shelf, expand the Cables category.


8. Read the descriptions for the cables to locate the cable that connects the USB hub to the computer. Select the USB Cable (A/5-pin mini).


9. In the Selected Component window, select the Mini-B connector. Drag the connector to the USB port on the back of the USB hub.


10. In the Selected Component window, select the unconnected connector. Drag the connector to the open USB port on the back of the computer.


11. Switch to the front view of the USB hub.


12. To connect the scanner, switch to the back view of the scanner. Identify the USB port.


13. On the Shelf, read the descriptions for the cables to locate the cable that connects the scanner to the hub. Select the USB (A/B) cable.


14. In the Selected Component window, select the B connector. Drag the connector to the USB port on the scanner.


15. In the Selected Component window, select the unconnected connector. Drag the connector to an open USB port on the front of the USB hub.


16. Examine the ports on the video camera. Tip : If necessary, zoom in to get a better view of the ports. Identify the USB port.

17. On the Shelf, read the descriptions for the cables to locate the cable that connects the camera to the hub. Select the USB Cable (A/5-pin mini).


18. In the Selected Component window, select the Mini-B connector. Drag the connector to the top-left USB port on the video camera.


19. In the Selected Component window, select the unconnected connector. Drag the connector to an open USB port on the front of the USB hub.


Admin Use Only: IT139B

3.4.14 Set Up a Computer (Demo Video) Transcript:

In this scenario, you're setting up a new computer and attaching its peripherals.

First, we'll plug a power strip into the wall outlet. It's essential to always use a power strip with surge protection to power a computer. Never ever plug your computer directly into the wall outlet because an electrical surge could instantly ruin your whole computer.

Open the Outlets menu on the shelf. Drag the power strip here until you see a yellow outline, then release the mouse. Down here, you can see the strip's power connector. Drag it to an available place in the wall outlet.

Now, let's plug the computer into the power strip. Click Back to view the back of the computer. You can use the mouse wheel to zoom in and out on the workspace. Open the Cables menu and select an AC power cable. Drag the female end of the cable to the power port on the computer, then drag the male end to an available space on the power strip.

Next, let's add some peripherals to the system. Open the Input Devices menu, then drag the keyboard onto the workspace. With the keyboard selected, drag its USB connector to an available USB port on the back of the computer. We'll add the mouse in the same way. Open the Input Devices menu, then drag the mouse onto the workspace. With the mouse selected, drag its USB connector to an available USB port on the back of the computer.

Now let's add the speakers. Open the speakers menu, then drag the speakers to the workspace. Then, with the speakers selected, drag the green TRS connector to the green TRS port on the back of the computer.

Next, let's connect the monitor. Open the monitors menu and drag the monitor to the workspace. Use the back button to view the back of the monitor. Monitors need two cables to work: A power cable and a data cable. First, let's connect the power cable. Open the Cables menu and select an AC power cable. Drag the female end of the cable to the power port on the monitor then drag the male end to an available space on the power strip.

Now let's connect the monitor to the computer. Select the DVI cable from the shelf. Drag one end of the cable to the DVI port on the monitor, and the other end to the DVI port on the computer.

Finally, we need to connect the computer to our network so it can access the Internet. Select the Cat5e cable from the shelf. Drag one end of the cable to the RJ-45 port on the computer and the other end to the RJ-45 port on the wall plate. The computer is now set up and ready to use.

3.4.15 Set Up a Computer (Simulation) Scenario

You have just purchased a new computer for your dorm room. Your task in this lab is to set the computer up by doing the following:

• Plug the power strip into the wall.


• Plug the computer into the power strip.


• Connect the following components to the computer: o Keyboard


o Mouse


o Speakers

• Add the monitor to the Workspace, then use the appropriate cables to connect it to the computer and to the power strip.


• Use a network cable to connect the computer to the network port in the wall plate.


Use the following tips to complete this lab:

• Examine the shape and pin pattern for each connector. Match the correct cable connector to the correct computer port.


• If necessary, zoom in on the back of the computer or device on the Workspace to get a closer look at the connection ports.


• In some cases, you can match the color of the connector to the color of the port on the computer to identify possible matches.


• When you are done connecting devices, click the power buttons on the front of the monitor and the computer to verify that the system starts without errors.


• If you notice problems, recheck all of your connections.


Explanation

To complete this lab:

• Plug the power strip into the wall.


• Use an AC power cord to plug the computer into the power strip.


• Connect the USB connector on the keyboard to a USB port on the computer.


• Connect the USB connector on the mouse to a USB port on the computer.


• Connect the green connector on the speakers to the green audio out port on the computer.


• Connect the DVI video cable to the DVI ports on the computer and the monitor.


• Use an AC power cord to plug the monitor into the power strip.


• Use a network cable to connect the RJ-45 jack in the back of the computer to the RJ-45 jack in the wall plate.


The following table identifies the connectors and their corresponding ports on the computer: Speaker Connector

Speaker port

Speaker connector and port


DVI monitor cable DVI Port

DVI monitor cable and port


USB B Connector

USB B port

USB B connector and port


USB A connector USB A port

USB A connector and port


RJ-45 networking cable RJ-45 port

RJ-45 networking cable and port


Complete the following steps:

1. In the Workspace window, click the Back view button for the system case to view the back of the computer.


2. On the Shelf, expand the Outlets category.


3. Select the power strip.


4. In the Selected Component window, select the AC power plug of the power strip. Drag the power connector and drop it onto an AC power outlet in the Workspace (possible connection areas are highlighted as you move the cursor over the connection area). The power strip is automatically moved from the Shelf to the Workspace.


5. To plug in the computer, expand the Cables category on the Shelf.


6. Select the AC power cable.


7. In the Selected Component window, select the AC Power Connector (Male) adapter. Drag the power connector and drop it onto a highlighted AC power outlet on the power strip on the Workspace.


8. In the Selected Component window, select the unconnected end of the cable and drag it onto the power plug-in on the back of the computer.


9. To connect the keyboard, expand the Input Devices category on the Shelf. Select the keyboard.


10. In the Selected Component window, drag the cable end to a USB port on the back of the computer.


11. To connect the mouse, select the mouse in the Input Devices category.


12. In the Selected Component window, drag the cable end to a USB port on the back of the computer.


13. To connect the speakers, expand the Speakers category on the Shelf. Select the speakers.


14. In the Selected Component window, drag the cable end to the green audio port on the back of the computer.


15. To connect the monitor, expand the Monitors category on the Shelf.


16. Drag the monitor from the shelf and drop it between or after existing objects on the Workspace.


17. Click the Back view button for the monitor.

18. On the Shelf, expand the Cables category. Select the DVI-D video cable.


19. In the Selected Component window, select a connector on the video cable. Drag the connector and drop it onto the DVI video port on the back of the monitor.


20. In the Selected Component window, select the unconnected video cable end. Drag the connector and drop it onto the DVI video port on the back of the computer.


21. On the Shelf, select an AC Power Cable.


22. In the Selected Component window, select the AC Power Connector (Male) adapter. Drag the power connector and drop it onto an AC power outlet on the power strip in the Workspace.


23. In the Selected Component window, select the unconnected end of the cable and drag it onto the power plug-in on the back of the monitor.


24. On the Shelf, expand the Cables category. Select the Cat5e cable.


25. Plug one end of the network cable into the RJ-45 jack in the back of the computer and the other end into the RJ-45 jack in the wall plate.


26. To verify that everything was connected correctly, click the Front view button for the computer and the monitor.


27. Click the power button on the monitor, then click the power button for the computer. If the power is connected, the blue light on the front of the computer will come on. If the computer turns on and the monitor is connected, you will then see the computer start up and load Windows.


3.4.16 Section Quiz (Section Quiz) q_itf_iohardware_facts_01

Match each item on the left to its appropriate category on the right. Answers:

• Monitor


• Internet browser


• Operating system


• Touchscreen


• Power cable


• RAM


• Video game


• Video game controller


Explanation:

Hardware refers to parts of the computer you can see and touch. Monitors, touchscreens, power cables, RAM, and video game controllers are all hardware.

Software refers to computer programs and applications that run on hardware. Internet browsers, operating systems, and

video games are all software.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_iohardware_facts_02

Which of the following is an input device? Answers:

• *Touchscreen


• Monitor


• Speaker


• USB port


Explanation:

Touchscreens are devices that receive input from the user. Monitors and speakers are both output devices.

USB ports allow both input and output devices to be connected to the system. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_iohardware_facts_03

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly?

Answers:

• *A peripheral


• An attachment


• A plug-in


• A flash drive


Explanation:

Peripherals are hardware devices that are connected to a computer system to enhance its functionality. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_iohardware_facts_04

Which type of connector is commonly used for keyboards and mice? Answers:

• *USB


• RCA


• XLR


• TRS


Explanation:

USB, or Universal Serial Bus, is used for mice, keyboards, flash drives, and many other common peripherals. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1.

q_itf_iohardware_facts_05

Paul has been asked to install a new printer. The most important requirement is that the printer needs to be fast. Which of the following printer types is the fastest?

Answers:

• *Laser printer


• Inkjet printer


• Dot matrix printer


• 3D printer


Explanation:

Laser printers are generally the fastest type of printer. Printing speed is especially noticeable for high-volume print jobs. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_iohardware_facts_06

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played.

Which troubleshooting step should you take first? (Select two.) Answers:

• *Verify that speakers are plugged into the correct jack and are powered on.


• *Verify that the volume isn't muted.


• Download and install the latest sound card drivers.


• Replace the sound card with a known-good spare.


• Verify that no IRQ or I/O port address conflicts exist between the card and other devices in the system.


Explanation:

You should first verify that the speakers are plugged in correctly and powered on. You should also verify that the volume isn't muted in the operating system.

Before investigating more complex possibilities, you should always check the obvious first when troubleshooting computer problems. The other actions might need to be performed if checking the obvious solutions does not correct the problem.

q_itf_iohardware_facts_07

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on.

Which of the following is the BEST step to try first? Answers:

• *Plug in an external monitor


• Replace the video card


• Replace the motherboard


• Calibrate the battery


Explanation:

If the built-in monitor isn't working, connect an external monitor to the laptop. If the display appears on an external monitor but not the built-in display, the problem could be a malfunctioning LED assembly or it could be due to the display output being redirected to the external monitor port using the Fn key. If you don't get a display on the internal or external monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard. You should calibrate the battery if your battery seems to be losing the ability to hold a charge or if the power drops shortly after starting to use it.

q_itf_iohardware_facts_08

Which connector on the back of a computer is used to attach a mouse to a modern PC system? Answers:

• Mini-DIN


• High-density (three row), female DB-15


• RJ-45


• Low-density (two row), female DB-15


• *USB A


• USB B


Explanation:

A mouse is most commonly attached to a computer using a USB A connector. 6-pin mini-DIN connectors were used to attach a mouse in the past; however, mini-DIN connectors are not used today. The DB-15 connector with two rows is commonly used for joysticks. The DB-15 connector with three rows is used for connecting CRT monitors to the video card. The RJ-45 connector is used for Ethernet network connections. USB B connectors are commonly used for connecting printers and scanners.

q_itf_iohardware_facts_keyboard

You have two different keyboard layouts configured on your Windows 10 computer. Which of the following keyboard shortcuts allows you to easily switch between them?

Answers:

• *Start + Spacebar


• CTRL + SHIFT + ESC


• CTRL + ALT + DEL


• Start + K


Explanation:

The keyboard shortcut Start + Spacebar allows you to easily switch between multiple keyboard layouts. The keyboard shortcut CTRL + SHIFT + ESC opens Task Manager in Windows 10.

The keyboard shortcut CTRL + ALT + DEL opens the Windows 10 lock screen. The keyboard shortcut Start + K opens the connect quick action in Windows 10. q_itf_iohardware_facts_mouse

You are troubleshooting a client's issue. Whenever she tries to double-click on a folder, the folder highlights but does not open. Your client gets frustrated because she has to keep clicking until the folder finally opens.

Which of the following should you do to correct this issue? Answers:

• *Select a slower double-click speed in Mouse Properties.


• Select a faster double-click speed in Mouse Properties.

• Tell the user to click the mouse buttons slower.


• Tell the user to click the mouse buttons faster.


Explanation:

If a folder is not opening when double-clicking, the user should go into the Mouse Properties window and select a slower setting.

Selecting a faster setting will require the user to click faster to open the folder. This will not fix the issue.

You should never tell a user to change their behavior to fix a problem, especially when there are configuration changes that can be made to adjust to the user's behavior.

q_itf_iohardware_facts_ocr

You are using your new scanner to scan a text document so you can edit it on the computer. Which type of software would you use to do this?

Answers:

• *OCR


• TWAIN


• WIA


• CCD


Explanation:

Optical Character Recognition (OCR) software is used to scan text documents and convert them into a document that can be edited on the computer.

TWAIN is an older type of software used by scanners to capture images.

Windows Image Acquisition (WIA) is used by newer scanner software to capture images.

The charge coupled device (CCD) array is the component inside the scanner that captures the image. q_itf_iohardware_facts_usb

Which of the following physical connections would you MOST likely use to connect a digital camera to a computer in order to transfer files?

Answers:

• CAT 5e


• *USB


• HDMI


• Wi-Fi


Explanation:

Most digital cameras use a USB connection to transfer files to a computer.

CAT 5e is used for network connections and would not be used by a digital camera to transfer files. HDMI is used for displays and would not be used by a digital camera to transfer files.

Wi-Fi is a wireless (not physical) connection that some digital cameras can use to connect to a computer to transfer files. q_itf_iohardware_facts_webcam_01

Which of the following is a type of peripheral input device that can be integrated into a laptop computer to provide digital camera functionality?

Answers:

• Image scanner

• Graphics card


• *Webcam


• Monitor


Explanation:

Mobile devices already include integrated cameras, so they are not commonly used with external digital cameras and webcams. For example, webcams are input devices that are most often installed in a laptop just above the screen.

An image scanner can be connected to a computer to allow you to scan paper documents and photographs into digital files. It is not designed to provide the functionality of a digital camera.

A graphics card is designed to work with the CPU to enhance the processing speed of digital images and video. It is not designed to provide digital camera functionality.

While a monitor is an integrated peripheral device included with a laptop computer, it is an output device, not an input device.

q_itf_iohardware_facts_webcam_02

Which of the following devices is typically installed in the chassis above the screen in a laptop? Answers:

• Speakers


• Touchpad


• Wireless NIC


• *Webcam


Explanation:

Webcams are most commonly installed in the chassis above the screen in a laptop. Speakers are installed in the body of the laptop surrounding the keyboard.

The touchpad is typically installed in the palm rest area of the laptop below the keyboard.

A wireless NIC is connected to the motherboard. The antenna cables are often routed through the laptop and up the sides of the screen, but the wireless NIC itself is installed on the motherboard.

q_itf_externaldevices_facts_01

Which kind of connector is pictured here? Answers:

• *USB


• RJ-45


• NEMA 5-15R


• LC/SC


Explanation:

The connector pictured is a male USB A connector. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_externaldevices_facts_02

You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work.

Which of the following troubleshooting steps is the BEST to try first?

Answers:

• Try a different USB cable.


• Replace the USB device.


• Install a new USB controller card.


• *Make sure the USB device is plugged in properly.


Explanation:

The first thing to check is whether the USB device is plugged in properly. If that doesn't correct the problem, you might try a different USB cable before doing more extensive troubleshooting. You should only replace the device or install a new USB controller card after verifying where the problem lies. For example, if you try the device on another computer and it still doesn't work, you might assume that the device is defective. If the device works on a different computer, then the USB ports on the first computer might be defective.

q_itf_externaldevices_facts_03

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After the installation, the system frequently crashes when you try to access the new device.

Which of the following steps would MOST likely resolve this issue? Answers:

• *Download and install the latest driver from the manufacturer's website.


• Remove and then reinstall the device.


• Replace the device itself.


• Run the Add Legacy Hardware wizard and manually configure the device.


Explanation:

The first thing to try would be to download and install the latest driver for the device from the manufacturer's website. You would use the Add Hardware wizard to configure Legacy (non plug-and-play) devices. Reinstalling or replacing the device should only be done after performing other troubleshooting tasks.

q_itf_externaldevices_facts_04

A small business has been experiencing power outages in their area. When checking the IP-based security camera, they were not able to access the camera. They verified the camera was on and had power. What is MOST likely the problem? Answers:

• *The camera is not connected to the wireless network


• The camera has been damaged by the power outage


• The camera's memory card is full


• The camera has an invalid gateway address


Explanation:

The most likely problem is that the camera is not connected to the wireless router which would also have been affected by the power outage and sometimes takes longer to boot and re-connect to the Internet.

It is less likely that the camera was damaged.

The memory card getting full would not impact accessing the camera.

It is also less likely that the camera would have obtained an invalid gateway address.

q_itf_externaldevices_facts_05

What must a laptop have in order to work outside of the house and still reman connected to the internet? Answers:

• *WLAN card


• Bluetooth module


• Infrared sensor


• FireWire connection


Explanation:

A wireless local area network (WLAN) that conforms to 802.11 standards is called a Wi-Fi network. Device that communicate on these networks must have a WLAN card.

Bluetooth is a short-range wireless communication technology used to connect peripherals such as wireless headphones, speakers, keyboards, and mice. While you can access the internet using a Bluetooth connection between your smartphone and your laptop, a WLAN card would be a better option in this scenario.

An infrared (IR) sensor transmits and/or receives information using infrared radiation. Since IR devices cannot transmit through walls, they are used primarily in short-range communication, such as TV remotes.

FireWire is a common interface used to connect peripherals such as digital cameras and external hard drives to a computer.

q_itf_externaldevices_facts_06

Jeff has been asked to replace a monitor on a workstation. Which of the following device interfaces could he use to connect the new monitor?

Answers:

• *DVI


• USB


• UPS


• SSID


Explanation:

Digital Visual Interface (DVI) connectors are designed to connect digital monitors to a computer.

Universal Serial Bus (USB) is a common interface used to connect peripherals, such as mice, keyboards, printers, and digital cameras to a computer.

An Uninterruptible Power Supply (UPS) is a large battery that's connected both to the computer and the wall outlet. As long as power is coming in from the wall, the computer uses that power directly. However, if the power from the wall shuts off, the computer immediately jumps to battery power.

A Service Set Identifier (SSID) is the primary name associated with a WiFi network. q_itf_externaldevices_facts_07

Rico, a technician, works for a manufacturer that has been experiencing power outages at one of their warehouses. The warehouse has a number of IP-based security cameras. After the last power outage, the cameras are all powered on but are not accessible from the security office. Which of the following is MOST likely the cause?

Answers:

• *The wireless router has either not reconnected to the network or the cameras are not reconnecting.


• All the cameras were damaged in the power outage.


• The wireless router was damaged in the outage and requires a firmware upgrade.


Explanation:

The most likely cause is that the wireless router has not reconnected to the network. Either more time or manual intervention may be required to resolve the issue.

It is highly unlikely that all cameras would have been damaged by a power outage.

A firmware upgrade would not resolve a connectivity issue caused by a power outage. Wireless routers default to the IP protocol which would match the IP-based cameras. q_itf_externaldevices_facts_bluetooth

What is the maximum working range of a Class 3 Bluetooth device? Answers:

• *1 meter


• 10 meters


• 100 meters


• 0.5 meters


Explanation:

Class 3 Bluetooth devices can work at a maximum range of 1 meter or 3 feet. Class 2 Bluetooth devices can work at a maximum range of 10 meters or 33 feet. Class 1 Bluetooth devices can work at a maximum range of 100 meters or 238 feet. Class 4 Bluetooth devices can work at a maximum range of 0.5 meters or 1.5 feet. q_itf_externaldevices_facts_displayport

Which of the following is an advantage of DisplayPort 1.4 over HDMI 2.0? Answers:

• DisplayPort connection monitors are less expensive than HDMI connection monitors.


• DisplayPort can connect gaming consoles; HDMI can only connect computers to monitors.


• *DisplayPort has a greater maximum bandwidth than HDMI.


• DisplayPort is supported by more devices than HDMI.


Explanation:

While HDMI supports a maximum bandwidth of 18 Gbps, DisplayPort 1.4 has a maximum bandwidth of 32.4 Gbps, which supports a much greater resolution.

DisplayPort connections are more expensive than HDMI connections because they are more expensive to make. DisplayPort and HDMI can both connect gaming consoles and computer to TVs and monitors.

HDMI is supported by more devices than DisplayPort. q_itf_externaldevices_facts_dlp

Which of the following display devices uses adjustable mirrors along with a light source and color filters to display the correct image?

Answers:

• LCD


• CRT


• *DLP


Explanation:

Digital Light Processing (DLP) is a display technology often used in projectors. DLP devices use mirrors that can be adjusted with the light source and color filters to display the correct image.

Liquid Crystal Display (LCD) is a type of flat screen display often used in laptops.

Cathode Ray Tube (CRT) is an older display device that used an electron beam passing through color filters to display the correct image.

Light Emitting Diodes (LED) are often used as the backlight for LCD displays. q_itf_externaldevices_facts_drivers

Sam has installed a new software game onto his computer. He reads on the internet that if he updates his video card driver software, the game will perform better. He installs the latest driver for his video card, but after installing the driver, it causes other problems on his computer. What is the simplest way Sam can fix this issue?

Answers:

• *Use the Roll Back Driver button in his video cards properties.


• Uninstall the driver manually.


• Delete the new game.


• Perform a firmware update to his video card.


Explanation: q_itf_externaldevices_facts_dvi

Which graphics interface supports both digital and analog signals? Answers:

• VGA


• *DVI-I


• DVI-D


• HDMI


Explanation:

DVI-I is the graphics interface that supports both digital and analog signals. VGA only support analog signals.

DVI-D only supports digital signals. HDMI only supports digital signals. q_itf_externaldevices_facts_firewire

How many pins does an unpowered Firewire connector have? Answers:

• Six


• Five


• *Four


• Twenty-four

A unpowered Firewire connector has four pins. A powered Firewire connector has six pins.

A micro-USB connector has five pins.

A USB C connector has twenty-four pins. q_itf_externaldevices_facts_hdmi

You are helping a client connect their new Blu-ray player to their 4K projector. Which of the following cables would you MOST likely use?

Answers:

• DisplayPort


• *HDMI


• DVI


• Thunderbolt


Explanation:

HDMI is the most widely used connection for high-definition devices. Consumer-level devices such as Blu-ray players would most likely use an HDMI cable.

DisplayPort is typically used on computer systems and would not be used to connect a Blu-ray player to a projector. DVI is used on computer systems and would not be used to connect a Blu-ray player to a projector. DVI also does not support 4K resolutions.

Thunderbolt is primarily used on Apple computers and would not be used to connect a Blu-ray player to a projector. q_itf_externaldevices_facts_ieee

What is the maximum supported transfer rate for the IEEE 1394b standard? Answers:

• 480 Mbps


• 400 Mbps


• 5 GBps


• *800 Mbps


Explanation:

The IEEE 1394b, or Firewire 800, standard supports a maximum transfer rate of 800 Mbps. USB 2.0 supports a maximum transfer rate of 480 Mbps.

IEEE 1394, or Firewire, supports a maximum transfer rate of 400 Mbps. USB 3.0 supports a maximum transfer rate of 5 Gbps. q_itf_externaldevices_facts_nfc

Which of the following is a version of RFID that can work as both a tag and a reader? Answers:

• *NFC


• Passive RFID


• Active RFID


• Bluetooth

NFC is a peer-to-peer version of RFID. This means it can be used as both a tag and a reader. NFC is commonly used for contactless payment, security ID tags, and more. NFC typically needs to be scanned at a distance of 2 inches or less.

A passive RFID tag only responds when scanned at close range (approximately 25 meters). It cannot be used as the reader.

An active RFID tag has a scanning range of approximately 100 meters. It cannot be used as the reader.

Bluetooth is a short-range wireless communication technology used to connect peripherals such as wireless headphones, speakers, keyboards, mice, smart watches, printers, and game controllers to a computer, including smartphones. q_itf_externaldevices_facts_rfid

Bob is configuring a new inventory tracking system that uses special labels to mark each inventory item. To track the inventory, Bob must be within 25 meters of the label and use a special reader to retrieve the information that's embedded in the tag.

Which of the following device interfaces is MOST likely being used? Answers:

• *Passive RFID


• Active RFID


• NFC


• NIC


Explanation:

Bob is using a passive unpowered RFID in this scenario. A passive RFID tag only responds when scanned at close range (approximately 25 meters).

An active RFID tag has a scanning range of approximately 100 meters. Because Bob must be within 25 meters, active RFID is not the most likely interface being used.

NFC is a peer-to-peer version of RFID that is commonly used for contactless payment, security ID tags, and more. NFC typically needs to be scanned at a distance of 2 inches or less.

An NIC is a network interface card. This is used to connect a device to a network and would not be used in this scenario. q_itf_externaldevices_facts_thunder

You are connecting an external monitor to an Apple Macbook. Which of the following connectors would you MOST likely use?

Answers:

• HDMI


• VGA


• DisplayPort


• *Thunderbolt


Explanation:

Thunderbolt connectors were developed by Intel and are used primarily with Apple workstations and laptops to connect external displays.

While HDMI is the most widely used video interface, it would not be the most likely connection used to connect an external display to an Apple MacBook.

The Video Graphics Array, or VGA connector, is used to connect older monitors to a system.

DisplayPort is used to connect displays, but it would not be the most likely connection used to connect an external display to an Apple MacBook.

q_itf_externaldevices_facts_usb_01

Which of the following devices normally provide a mini-USB (Universal Serial Bus) or micro-USB connector? (Select

three.) Answers:

• Printer


• Game console


• *Digital camera


• *Smartphone


• Home audio/video receiver


• DVD player


• *Tablet


Explanation:

Devices such as digital cameras, tablets, and smartphones normally provide a mini or micro-USB connector. Devices such as printers, game consoles, home audio/visual receivers, and DVD players normally provide a USB-A connector (the standard USB connection).

q_itf_externaldevices_facts_usb_02

How much power can a USB 3.0 dedicated charging port supply? Answers:

• 4.5W


• *7.5W


• 2.5W


• 15W


Explanation:

A USB 3.0 dedicated charging port can provide up to 7.5W of power to a single device. A dedicated charging port does not allow for any data transfer.

A standard USB 3.0 port that also allows for data transfer will provide 4.5W of power to a single device. USB 2.0 provides up to 2.5W of power to a single device.

USB C can provide up to 15W of power to a single device. q_itf_externaldevices_facts_usb_03

Which USB mode supports up to 5 Gbps? Answers:

• 1.1


• 2.0


• *3.0


• 3.1


Explanation:

USB 3.0 introduced SuperSpeed mode, which supports speeds of up to 5 Gbps. USB 1.1 supports up to 12 Mbps.

USB 2.0 supports up to 480 Mbps. USB 3.1 supports up to 10 Gbps. q_itf_externaldevices_facts_vga

Which display connection type uses a 15-pin connector? Answers:

• HDMI


• DVI-D


• *VGA


• DVI-A


Explanation:

VGA is a legacy analog interface that uses a 15-pin connector. The connector is typically blue and has three rows of pins.

HDMI cables contain 19 pins.

DVI-D connectors can have either 19 or 25 pins. DVI-A connectors contain 17 pins.

3.5 Storage

Section Introduction

As you study this section, keep the following questions in mind:

• How is storage different than memory? How are they similar?


• What are the advantages and disadvantages of each storage medium?


• How does storage relate to input, output, and processing?


After finishing this section, you should be able to:

• Compare and contrast the features of different external storage devices, including hard disk drives, optical drives, flash storage, and solid state drives.


• Describe common file system features, including compression, encryption, permissions, journaling, and file naming rules.


• Compare and contrast common file systems, such as NTFS, FAT32, HFS, and Ext4.


• Describe disk partitioning and formatting methods.


• Describe disk maintenance procedures, including defragmentation, repair, and cleanup.


• Describe emerging storage technologies.


• Install SATA hard drives in a computer. o Connect drives to the motherboard. o Plug in the power connector from the power supply.


• Install an eSATA port connector to a computer by connecting the cable to an available motherboard port.

• Boot a computer into the BIOS and verify that newly installed hard drives are detected.


• Initialize new disks using the MBR partition style.


• Create a volume on a disk with a specific volume size, drive letter, file system, and volume label.


• Format a flash drive with the FAT32 file system.


• Convert a drive to use NTFS instead of FAT32 without destroying any existing data on the disk.


• Run Disk Cleanup on a local hard drive.


• Configure disk defragmentation to run on a schedule.


Key terms for this section include the following:

Term Definition


Hard Disk Drive (HDD)

The most common type of long-term storage that uses thick magnetic disks encased in a protective housing to store data.


Optical Drive

A storage device that uses light instead of magnetism to store information. This include CD-ROM, DVD, and Blu-ray devices.


Flash Storage

A compact, portable storage device that uses special memory chips to store data.


Solid State Devices (SSD)

A device with similar capacity to an HDD that uses flash storage instead of magnetic disks to store data. SSDs are much faster and more durable than hard disk drives but usually are more expensive.


External Hard Disk Drives

An HDD that can be connected as a peripheral to a computer.


Heat-Assisted Magnetic Recording

Type of drive that allows bits of data to become smaller and more tightly packed together while still retaining data. It uses a tiny laser to briefly heat the recording surface of the hard drive to write the data making it more receptive to the effects of magnetism, which allow writing on much smaller areas than were possible before.


3D Flash Memory

Type of memory that implements tiers of solid-state flash memory stacked on top of each other allowing for much greater storage capacity at a lower cost than 2D flash memory.


Synthesized DNA Strands

Synthetically produced artificial DNA that is capable of storing vast amounts of information and may be a solution to long-term massive storage.


File

The smallest container within a computer's storage system that is used to store information such as data, settings, and

commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.


File Format

The way a file is organized. File formats are indicated by an extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4,

.avi, and .wmv.


File System

The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.


Compression

Reencoding a file to consume less storage space.


Encryption

The process of converting information so it cannot be understood without decrypting it using a key, especially to prevent unauthorized access.


File Permissions

The use of user and file attributes that control which users can read, write, move, or delete each file.


Journaling

The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.


Drive

The top-level folder, or directory, of a file system.


Partitioning

The process of dividing a single physical disk into multiple logical drives called volumes.


Fragmentation

When parts of a single file, program, or application are stored in different areas of a physical disk.


Defragmentation

A utility in which all fragmented files on a drive are found and reconsolidated into the same physical location on the disk.


3.5.1 Storage Types (Lesson Video) Transcript:

When a processor needs to store information about a program it's currently running, it uses RAM. RAM is extremely fast, and the processor can read from and write to it billions of times each second. However, RAM is volatile – if the system turns off, RAM loses everything it had stored in memory. In this video, we'll look at some ways computers store data long-term.

Long-term data storage needs to be persistent, so that if the system is turned off and then back on again, that same information is still intact. Data can be stored long-term on a variety of storage devices. Common types of storage include the following:

Hard disk drives, or HDDs, are one of the most commonly used types of long-term storage in computing devices, especially in desktop systems. Inside the drive, there's a spinning metal disk. A tiny magnet creates microscopic magnetic charges on the disk to represent ones and zeros. Hard disks can store a large amount of data, but because they rely on moving parts, they're prone to failure if they get shaken or jostled too much.

Optical drives are also commonly used for long term storage in desktop and laptop systems. Examples of optical drives include DVD and Blu-ray drives. They use lasers to create tiny light and dark spots on the disc, which represent ones and zeros. Optical discs can store moderate amounts of information but are quite slow in comparison to other types of storage devices.

Flash storage is used by most mobile devices for long-term, persistent storage instead of a hard disk drive. Unlike a hard disk drive, flash storage uses memory chips to save information. Because flash memory doesn't have any moving parts, it's great for laptops and mobile devices because it won't break if it gets bumped or shaken.

Some desktop systems replace the traditional internal hard disk drive with a special type of flash storage called a Solid State Device, or SSD. SSDs are much faster and more durable than hard disk drives. The downside is that they're much more expensive. For this reason, many desktop computers use a small SSD for the operating system and programs and a large HDD for storing files.

External storage devices, such as flash drives or external hard disks, are frequently connected to computing devices to add additional storage capacity to the system. For desktops and laptops, this is usually accomplished using a USB connection. Mobile devices usually include a memory card slot into which an external memory card can be inserted.

In this video, we learned about non-volatile devices for long-term storage. We looked at hard disk drives, optical drives, flash storage, solid state devices, and external storage.

3.5.2 Storage Facts

A processor uses random access memory (RAM) to store information about a program it's currently running. RAM is extremely fast, and the processor can read from and write to it billions of times each second. However, RAM is volatile; if the system shuts off, RAM loses everything it had stored in memory.

This lesson covers the topic of common storage devices. Common Storage Devices

To store information when the computer is turned off (called persistent storage), computers must use long-term storage. Otherwise, data would be lost whenever the system shuts down. There are several different types of long-term storage devices that are commonly implemented in most computer systems.

Table 1: Common Storage Devices Storage Device

Description


Hard disk drive Hard disk drive.

The most common type of long



Optical drive Optical drive.

Most desktop and notebook systems include an optical drive. Optical drives use


Flash storage Flash storage.

Flash storage uses special memory chips to store data. Flash storage drives are


Solid state devices (SSD) Solid state device.

Some desktop and laptop systems replace the traditional internal hard disk drive


External hard disk drives External hard disk drive.

External hard disk drives are frequently connected to computing devices to add


3.5.3 Emerging Storage Technologies

Ever since the arrival of the first computers, new storage technologies have emerged to help users store data. Many computers have a hard drive or solid-state drive (SSD) built in. On top of this, this internal storage can be expanded by external storage such as CDs, discs, memory sticks, cards, and cloud storage. As technology progresses, these storage media are offering more and more storage at a lower cost.

Several new forms of storage are starting to make their way onto the scene that look to continue this trend. These include heat-assisted magnetic recording, 3D flash memory, and data stored on synthesized DNA strands.

Heat-Assisted Magnetic Recording

Heat-assisted magnetic recording is a cutting-edge type of drive that allows bits of data to become smaller and more tightly packed together than ever before while still retaining data. A tiny laser is used to briefly heat the recording surface of the hard drive to write the data. Heating the surface makes it much more receptive to the effects of magnetism, which allows us to write on a much smaller area than was possible before. This method provides a massive storage advantage over traditional hard drives.

These drives were developed by drive manufacturer Seagate and first released in 2019. The first models were able to hold 16TB of data with more to come.

3D Flash Memory

A zoom-in of the different tiers of 3D flash memory. Illustration.

Traditional 2D flash memory has been around since the 1980s and has been widely used ever since. Flash memory is what we usually refer to when we say SSD because it doesn't have the moving parts that traditional hard drives have. It's a non-volatile form of memory that can be electrically erased and written. This type of memory is often found in memory cards, USB storage devices, and other internal solid-state drives found in computers, smartphones, and tablets. 3D flash memory is simply the next logical step. This is done with tiers of solid-state flash memory stacked on top of each other, as shown in the image. This allows for much greater storage capacity at a lower cost than 2D flash memory, making it an attractive choice for the future.

Storing Data in Synthesized DNA Strands


A synthesized DNA strand for storing data. Illustration.

DNA stands for deoxyribonucleic acid. DNA is the building block of all living organisms and is made up of small pairs of components called nucleotides, represented by the letters G, A, T, and C. In a person, DNA stores genetic information that determines all sorts of things about them, from hair and eye color to the size and shape of the body.

Scientists have been able to produce synthetic DNA artificially in a lab. This kind of DNA is capable of storing vast amounts of information and may be a solution to long-term massive storage. A single gram of DNA can store 215 petabytes (215 million gigabytes) of information. In addition to being extremely compact, if kept in proper conditions, DNA can last for hundreds of thousands of years without using much energy. This gives it a distinct advantage over almost any other kind of storage medium.

This form of storage, however, has several drawbacks. Currently, both encoding and decoding information using DNA is a costly and time-consuming process. The focus of storage technologies these days is to make it as cheap and efficient as possible. So, DNA storage hasn't seen widespread adoption up to this point.

3.5.4 Install SATA Devices (Demo Video) Transcript:

In this lab, you'll add two new hard drives to a desktop system. To start, go into the motherboard view. Check the motherboard specifications by selecting the board, then clicking Details, Specifications. This document tells us that the SATA connectors are at the bottom-right corner of the board. If we zoom in, we can see the distinctive L shape of a SATA port. They're also nicely labeled.

To add the hard drives to the system, switch to the drive bays view and drag the drives in from the shelf. Now that the drives are in, they each need a power connection and a data connection. We'll do the data connection first. Select a SATA cable from the shelf. Connect one end to the SATA port on one of the drives and connect the other end to a SATA port on the motherboard. Do the same thing for the other hard drive. Next, we'll do the power connection. Select the power supply and find the 15-pin SATA connectors. Drag one connector to each hard drive.

Now that the drives are in place, we can power on the computer and make sure everything's working. Press F2 to view the system information. If we scroll down, we can see both drives, which means they were installed correctly.

3.5.5 Install SATA Devices (Simulation) Scenario

You work part-time at a computer repair store. You're building a new computer. The customer has requested two serial ATA (SATA) hard drives in the computer.

In this lab, your task is to complete the following:

• Install both hard drives in the computer. o Read the motherboard documentation to identify the location of the internal SATA connectors.


o Use the Drive Bays view to install the hard drives into free 3.5" drive bays.


o For each drive, connect one end of a SATA cable to the drive and the other to a red SATA port on the motherboard.


o Switch to the Motherboard view to plug in the correct SATA power connector from the power supply for both drives.


• Boot the computer into the BIOS and verify that both drives are detected. (To enter the BIOS, restart the computer and press F2 .)

Windows is not installed, so the operating system will not start. Explanation

In this lab, your task is to complete the following:

• Install both hard drives in the computer. o Read the motherboard documentation to identify the location of the internal SATA connectors.


o Install the hard drives into free 3.5" drive bays.


o For each drive, connect one end of a SATA cable to the drive and the other to a red SATA port on the motherboard.


o Plug in the correct SATA power connector from the power supply for both drives.


• Boot the computer into the BIOS and verify that both drives are detected.


Complete this lab as follows:

1. Identify the port locations for SATA connectors on the motherboard as follows: a. Above the computer, select Motherboard to switch to the motherboard view.


b. Select Yes to turn off the computer.


c. Select the motherboard .


d. Under Selected Component, select Details .


e. Select the Specifications tab.


f. Read the documentation to identify the location of the SATA ports.


g. Close the documentation after you've found the SATA ports.


2. Install the hard drives as follows: a. Above the computer, select Drive Bays to switch to the drive bay view.


b. On the Shelf, expand Hard Drives .


c. Drag a hard drive from the Shelf to an open 3.5" drive bay.


d. Drag the second hard drive from the Shelf to an open 3.5" drive bay.


e. On the Shelf, expand Cables .


f. Select the cable used to connect SATA devices.


g. Under Selected Component, drag a SATA connector to the hard drive.


h. On the Shelf, select a second cable used to connect SATA devices.

i. Under Selected Component, drag a SATA connector to the second hard drive.


j. Above the computer, select Motherboard to switch to the motherboard view.


k. Under Selected Component, drag the unconnected SATA connector to a SATA port on the motherboard.


l. At the top under Partial Connections, select the SATA cable .


m. Under Selected Component, drag the unconnected SATA connector to a SATA port on the motherboard.


a. Above the computer, select Drive Bays to switch to the drive bay view.


b. At the top under Partial Connections, select the power supply .


c. Under Selected Component, drag a SATA power connector to the hard drive.


d. Under Selected Component, drag a SATA power connector to the second hard drive power.


3. Connect power to both hard drives as follows:


4. Above the computer, select Front to switch to the front view of the computer.


5. On the monitor, click the power button.


6. On the computer, click the power button.


7. As the system starts, press the F2 or Delete key to enter the BIOS setup program.


8. Verify that the hard drives were detected.


3.5.6 Files and File Systems (Lesson Video) Transcript:

Chances are, you've already worked with computer files, such as image files, music files, or text files. In this video, we're going to take a closer look at what files are and how they work.

All data on a storage medium, such as a hard disk or flash drive, is encoded as a single enormous list of ones and zeroes. A file is a big clump of ones and zeroes that go together. While it's possible for a file's data to be completely arbitrary, most files are organized in a specific way, called a file format. Let's look at a picture file as an example.

Each of these boxes represents a single byte of information in a single picture file. These first cells store information about the file itself, called metadata. The metadata store the total file size, the height and width of the image, the color depth, and other info the computer needs to process the file. The rest of the bytes in the file store the actual pixels that make up the image. When you tell a computer to open an image file, it looks at the metadata, then uses the information there to decode the file and show the picture.

There are millions of file types, and developers can make new ones whenever they need to. To determine a file's type, you can look at the filename. A filename has two parts, separated by a period: the name of the file and the file extension, or type. Common image extensions include .jpg, .gif, and .png. Audio file types include .mp3, .wav, and .wma. Video file types include .mp4, .avi, and .wmv.

Files are great, but if the computer doesn't know where to find them, they won't do much good. Imagine how long it would take to find a specific book in a library where all the books were dumped out on the floor. To keep things organized, computers use file systems, which are part of the operating system.

File systems use a special file called a directory file to keep track of the information in storage. The directory file contains the names of all the other files in the system. In this example, the directory keeps track of the file name, extension, creation date, read/write permissions, and location on the disk. When the user tells the computer to open a file, it looks at the directory, then finds the appropriate location in storage to retrieve the file. Whenever a user adds, modifies, or deletes a file, the computer keeps track of the change in the directory file.

This directory also contains two subdirectories, or folders. Folders make the computer's file structure easier for humans to understand by grouping similar files into the same directory. For example, a person may make a folder for all their music, then subfolders for each band, then for each album. This is called a hierarchical file system. The directory that contains all the others is called the root directory.

There are several different file systems a computer may use. They generally do the same thing as far as the user is concerned but work differently behind the scenes. Older versions of Windows used a system called File Allocation Table 32-bit, or FAT32. Modern Windows systems use NTFS, or New Technology File System. Most MacOS systems use the extended Hierarchical File System, or HFS+. Linux distributions use a system called ext4.

In this video, we discussed files and file systems. We talked about what a file is and how computers use file formats to understand their data. We also looked at file systems, which computers use to keep track of all the files in storage.

3.5.7 File System Features (Lesson Video) Transcript:

In this video, we're going to learn about several features that are provided by a typical file system.

First, compression, which is a way of making data consume less storage space. For example, if an uncompressed file has fifty zeros in a row, a compression algorithm could encode the data as "fifty zeros" instead of recording each individual zero. Compressed files are much more efficient than uncompressed files.

Second, encryption. Often, users will store files on their computer with sensitive information such as bank account numbers and credit card info. By encrypting these files, the computer prevents unauthorized people from accessing their information.

Third, permissions. File systems use an Access Control List, or ACL, for each file and folder in the system. The ACL keeps track of which users can read, write, move, or delete each file.

Fourth, journaling. Every time a file changes the file system makes a note in its log. This is to prevent data loss in the case of a power loss or other system malfunction.

Each file system has a limit to the maximum file size it can support. However, this is only a problem for old file systems. FAT32, for example, had a maximum file size of 4 gigabytes. However, modern file systems have limitations that are so large it's impossible that a single file would ever approach the limit. NTFS, which is used by Windows, supports a maximum file size of 16 ExaBytes. That's enough space to store every single YouTube video in a single file.

Another limitation of file systems is which characters can be used in filenames. Going back to NTFS as an example, the characters shown here are reserved for special purposes within the file system and can't be used in file names.

In this video, we learned about file system features. We discussed compression, encryption, permissions, and journaling. We also talked about file size limitations and naming rules.

3.5.8 File System Facts

This lesson covers the following topics:

• File systems


• File system features


File Systems

There are many types of computer files, such as image files, music files, and text files. The following table describes terms associated with a typical file system.

Table 1: File Systems Term

Description


Files

All data on a storage medium, such as a hard disk or flash drive, is encoded as a single File formats

While it's possible for a file's data to be completely arbitrary, most files are organized in a


File extensions

There are many file types. Developers can make new ones whenever they need to. To


File systems

File systems use a special file called a directory file to keep track of the information in storage.


Specific file There are seve


File System Features

The following table describes features of file systems. Table 2: File System Features

Feature Description


Compression

A way of making data consume less storage space. For example, if an uncompressed file has


Encryption

The process of converting information so that it cannot be understood without a key to convert


Permissions

The actions (read, write, move, delete, etc.) users can perform on a file. File systems use an


Journaling

The process of noting in a change


Size limitations

The maximum file size a file system can support. This is a problem only for old file systems.


Naming rules

The character set that a files system allows for filenames. For example, NTFS reserved for


File sharing

The ability of users to allow other users to perform specified tasks


3.5.9 Drives and Partitions

A typical desktop computer system has several storage devices attached to it. For example, it may have a solid-state drive (SSD) for the operating system and key programs, a hard disk drive (HDD) for file storage, an optical drive for CDs and DVDs, and removable USB storage devices.

Drives

Typically, each storage device on the computer is called a drive. A drive is the top-level folder, or directory, of a file system. Each drive is assigned a letter by the computer. The one that contains the operating system is typically called the C drive (C:). The image below shows all the drives attached to a computer, each with their own letter name.

What happened to the A and B drives?

3.5.10 Disk Defragmentation (Lesson Video) Transcript:

In this video, we'll talk about fragmentation and defragmentation, which are important to understand if your computer uses a hard disk drive for storage.

Whenever you save a file to an HDD, the information is physically written onto the spinning disk. We can visualize it as a huge list of ones and zeros, where each color represents a file. At first, all the information for each file is grouped together. However, when files are changed and deleted, it creates gaps. This can lead to fragmentation, which is when parts of a new file or application are stored in different areas of the physical disk. This slows the computer down because the disk's read/write head has to jump all over the place to retrieve the file.

Fortunately, most computers have a built-in defragmenter utility that runs automatically, usually once a week. This utility finds all the fragmented files on a drive and reconsolidates them into the same physical location on the disk. This reduces the amount of movement needed to read a file, which dramatically speeds up the computer.

It's important to note that fragmentation is only a problem for spinning disk drives, such as HDDs. Solid state drives are random-access, meaning the computer can get information from any physical location on the device with equal speed. Even heavy fragmentation on an SSD won't result in a performance decrease.

In this video, we discussed fragmentation, which occurs when information for a single file or program is scattered over different locations on a disk. We also looked at defragmentation, which rewrites a disk's contents in a more efficient way.

3.5.11 Create Volumes (Demo Video) Transcript:

In this lab, you need to install two new hard drives and create volumes on them. We'll start by installing the drives. First, we'll shut the computer down. Now we can switch to the motherboard view to install the drives. We already have one drive installed here. Let's drag the other two into place from the shelf.

Each of these drives needs two connections – a power connection and a data connection. We'll do the power connection first. Click the power supply, then find the two 15-pin SATA connectors. Drag one connector to each drive.

Next, we'll do the data connection. On the shelf, select a SATA cable. Drag one end to a hard drive and the other end to a SATA port on the motherboard. Connect the other hard drive using the other cable from the shelf.

Now that the new drives are installed, we can turn the computer back on. Once Windows loads, right-click Start and select Disk Management. Click OK to initialize the new disks. Right-click Disk 1, then click Simple Volume. This wizard will help us configure the volume. Click Next. Change the volume size to 300,000 MB, then click Next. Assign the drive letter E, then click Next. Change the name of the volume to Data. Click Next, then Finish.

To create the other volume, right-click the unallocated space on Disk 1 and select New Spanned Volume. Click Next. Since this is a spanned volume, it can be allocated on multiple disks. Select Disk 2 and click Add. Click Next. Assign the drive letter S and click Next. Change the volume label to Art and click Next. Click Finish, then confirm by clicking Yes.

3.5.12 Create Volumes (Simulation) Scenario

You are the IT administrator for a small corporate network. The computer in Office 1 needs additional hard drive space. You have two hard drives available. You need to install the hard drives and create volumes on those hard drives so that they can be used to store data.

In this lab, your task is to complete the following:

• Install two SATA hard drives in the computer: o Use the Motherboard view to install the hard drives into free 3.5" drive bays.


o For each drive, connect one end of a SATA cable to the drive and the other to a SATA port on the motherboard.


o For each drive, plug in an available 15-pin SATA power connector from the power supply.


• Turn on the computer and use Disk Management to initialize both disks using the MBR partition style.


• Create a volume on Disk 1 with the following properties: o Volume size: 300000 MB


o Drive letter: E:


o File system: NTFS


o Volume label: Data

• Create a second volume using the remaining space on Disk 1 and all of the space on Disk 2 as follows: o Drive letter: S:


o File system: NTFS


o Volume label: Art


Explanation

In this lab, your task is to complete the following:

• Install two SATA hard drives in the computer: o Use the Motherboard view to install the hard drives into free 3.5" drive bays.


o For each drive, connect one end of a SATA cable to the drive and the other to a SATA port on the motherboard.


o For each drive, plug in an available 15-pin SATA power connector from the power supply.


• Turn on the computer and use Disk Management to initialize both disks using the MBR partition style.


• Create a volume on Disk 1 with the following properties: o Volume size: 300000 MB


o Drive letter: E:


o File system: NTFS


o Volume label: Data


• Create a second volume using the remaining space on Disk 1 and all of the space on Disk 2 as follows: o Drive letter: S:


o File system: NTFS


o Volume label: Art


Complete this lab as follows:

1. Install two SATA hard drives as follows: a. Above the computer, select Motherboard to switch to the motherboard view.


b. Click Yes to power off the system.


c. On the Shelf, expand Hard Drives .

d. Drag a hard drive to a free 3.5" drive bay.


e. Drag a second hard drive to a free 3.5" drive bay.


f. On the Shelf, expand Cables .


g. Select a SATA cable .


h. Under Selected Component, drag a connector to the hard drive.


i. Under Selected Component, drag the other connector to the motherboard SATA connector to connect the hard drive to the motherboard.


j. Repeat step 1g-1i to connect the second hard drive to the motherboard.


k. Under Partial Connections above the computer, select the power supply .


l. Under Selected Component, drag a SATA power connector to a hard drive to provide power to the hard drive.


m. Under Selected Component, drag a SATA power connector to the second hard drive.


a. Above the computer, select Front to switch to the front view of the computer.


b. Click the power button on the computer to turn the computer on.


c. After Windows loads, right-click Start and select Disk Management .


d. Make sure MBR is selected as the partition style.


e. Select OK to initialize all disks.


f. Maximize the Disk Management window for easier viewing.


a. Right-click the unallocated space on Disk 1 and select New Simple Volume .


b. Click Next .


c. In the Simple volume size in MB field, enter 300000 MB ; then click Next .


d. From the Assign the following drive letter drop-down list, select E .


e. Click Next .


f. Make sure NTFS is selected as the file system.


g. In the Volume label, enter Data .


h. Click Next .


i. Click Finish .


a. Right-click unallocated space on one of the disks and select New Spanned Volume .


b. Click Next .

c. Under Available, select the disk .


d. Select Add .


e. Click Next .


f. From the Assign the following drive letter drop-down list, select S .


g. Click Next .


h. Make sure NTFS is selected as the file system.


i. In the Volume label, enter Art .


j. Click Next .


k. Click Finish .


l. Click Yes to upgrade the disks to dynamic disks because spanned volumes can only be created on dynamic disks.


2. Initialize both disks using the MBR partition style as follows:


3. Create the Data volume as follows:


4. Create the Art volume as follows:


3.5.13 Format Drives (Demo Video) Transcript:

In this lab, you'll format a flash drive and then convert a volume on the hard drive to use a new file system. To start, drag the USB flash drive from the shelf into a USB port on the computer. Then, click the monitor to view Windows. Open File Explorer, then click This PC. Right-click the flash drive and select Format. Change the file system to FAT32 and check the box next to Quick Format. The, click Start. This popup warns that reformatting the drive will delete its data.

We're fine with that, so click OK.

Next, we'll use Windows PowerShell to convert the D drive to use the NTFS file system without erasing all of the existing data. The volume label for this drive is Data – we'll need to remember that for later. Click into the search bar and type PowerShell, then press enter. To convert the drive, type convert D colon space forward slash fs colon ntfs, then press enter. It prompts us to enter the current volume label of the drive, which is Data. When we press Enter, the drive is converted to NTFS.

3.5.14 Format Drives (Simulation) Scenario

You are the IT administrator for a small corporate network. You are working on the computer in Office 1. In this lab, your task is to complete the following:

• Insert the flash drive into a USB port in the computer.


• In Windows, use File Explorer to format the flash drive with the FAT32 file system using Quick Format.


• Open Windows Powershell and use the convert d: /fs:ntfs command to convert the Data (D:) drive to use NTFS instead of FAT32 without destroying any existing data on the disk.

If you format the D: drive, all existing data will be lost. Converting the drive keeps the existing data, but switches the volume to use the NTFS file system.

Explanation

In this lab, your task is to complete the following:

• Insert the flash drive into a USB port in the computer.


• In Windows, use File Explorer to format the flash drive with the FAT32 file system using Quick Format.


• Open Windows Powershell and use the convert command to convert the D: drive to use NTFS instead of FAT32 without destroying any existing data on the disk. If you format the drive, all existing data will be lost. Converting the drive keeps the existing data, but switches the volume to use the NTFS file system.


Complete this lab as follows:

1. Insert the flash drive as follows: a. On the Shelf, expand Storage Devices to find the flash drive.


b. Drag the flash drive to a USB slot on the front of the computer.


2. Format the flash drive as follows: a. On the monitor, select Click to view Windows 10 .


b. From the taskbar, open File Explorer .


c. Expand This PC .


d. Right-click Flash Drive (G:) and select Format to format the flash drive.


e. From the File system drop-down list, select FAT32 .


f. Under Format options, select Quick Format .


g. Select Start to format the flash drive.


h. Click OK .


i. Click OK when the formatting in complete.


j. Click Close .


3. Convert the D: drive to NTFS as follows: a. Right-click Start and select Windows PowerShell .


b. At the command prompt, type convert d: /fs:ntfs and press Enter .


c. Type Data and press Enter for the current volume label.

3.5.15 Perform Disk Maintenance (Demo Video) Transcript:

In this lab, you'll clean up and defragment a hard drive. Open file explorer and click This PC. Right-click the C drive and select Properties. Click Disk Cleanup. Make sure Setup Log Files and Temporary Files are checked. Scroll down and uncheck Thumbnails. Click OK, then click Delete Files.

Next, let's defragment the disk. On the Tools tab, click Optimize. Select the C and D drives by holding the control key on your keyboard while you click them. Click Optimize. This will go pretty quickly in the lab, but on a real computer it could take a few hours.

Finally, we'll set up the C drive to be defragmented on a schedule. Under Scheduled optimization, click Change settings. Make sure Run on a schedule is checked, and change the frequency to monthly. Click choose, then uncheck the D and E drives. Click OK, then click OK again.

3.5.16 Perform Disk Maintenance (Simulation) Scenario

You are the IT administrator for a small corporate network. The CEO has complained about slow performance on her computer. You have determined that the hard disk on her computer needs to be cleaned and defragmented.

In this lab, your task is to complete the following:

• Run Disk Cleanup on the C: drive to do the following: o Delete setup log files and temporary files. o Do not delete thumbnails.


• Optimize and defragment both the C: drive and D: drive.


• Configure the C: drive to be optimized and defragmented on a schedule using the following settings: o Run the optimization monthly.


o Choose only the C: drive for automatic optimization.


To configure disk optimization and defragmentation, use the Tools tab in the drive properties. Explanation

In this lab, your task is as follows:

• Run Disk Cleanup on the C: drive to do the following: o Delete setup log files and temporary files.


o Do not delete thumbnails.


• Optimize and defragment both the C: drive and D: drive.


• Configure the C: drive to be optimized and defragmented on a schedule using the following settings: o Run the optimization monthly.


o Choose only the C: drive for automatic optimization.

Complete this lab as follows:

1. From the taskbar, open File Explorer to run Disk Cleanup.


2. Expand This PC .


3. Maximize the window for easier viewing.


4. Run Disk Cleanup on the C: drive as follows: a. Right-click Local Disk (C:) and select Properties .


b. Select Disk Cleanup .


c. Under Files to Delete, select Setup Log Files .


d. Make sure Temporary files is selected.


e. Unmark Thumbnails .


f. Click OK .


g. Select Delete Files .


5. Opitimize and defragment both the C: drive and D: drive as follows: a. Select the Tools tab.


b. Select Optimize .


c. Select the Local Disk (C:) drive.


d. While pressing the Ctrl key, select the Data (D:) drive.


e. Select Optimize .


f. Wait for the optimization to finish running.


a. Under Scheduled optimization, select Change settings .


b. Make sure Run on a schedule is selected.


c. From the Frequency drop-down list, make sure Monthly is selected.


d. Select Choose to configure which disks are included.


e. Unmark Data (D:) .


f. Unmark Local Disk (E:) .


g. Click OK .


h. Click OK .

6. Configure disk defragmentation to run on a schedule as follows:


3.5.17 Section Quiz (Section Quiz) q_itf_storagetypes_facts_01

Which of the following is NOT an optical storage device? Answers:

• *Hard disk


• Compact disc


• Digital video disc


• Blu-ray disc


Explanation:

CDs, DVDs, and Blu-ray discs are all examples of optical storage devices. Hard disks are magnetic storage devices. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.1. q_itf_storagetypes_facts_02

Which of the following is NOT a long-term storage device? Answers:

• *RAM


• Hard disk


• Compact disc


• Flash drive


Explanation:

Random-Access Memory (RAM) holds data in short-term memory. Hard disks, compact discs, and flash storage are all long-term memory solutions.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_storagetypes_facts_03

Which of the following uses persistent memory chips to store data? Answers:

• *Flash drive


• Hard disk


• Compact disc


• RAM


Explanation:

Flash drives use persistent memory chips to store data. RAM uses memory chips, but they are not persistent.

Compact discs and hard disks are persistent, but they do not use memory chips. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_storagetypes_facts_04

Which of the following stores data using microscopic light and dark spots? Answers:

• *Compact disc


• Flash drive


• RAM


• Hard disk


Explanation:

The computer uses a laser to read the microscopic light and dark spots on CDs, which are then digitized into 1s and 0s. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_storagetypes_facts_05

You are in the process of purchasing several new Windows-based computers to replace broken or outdated computers. You have heard that solid state drives (SSDs) can significantly increase the overall performance of the system.

Which of the following BEST describes the features of solid state drives (SSD) compared to hard disk drives (HDD)? (Select TWO).

Answers:

• SSD spindles spin at a faster rate than HDD.


• *SSD uses flash technology to store data.


• SSD stores a large amount of storage cheaply.


• SSD can be adversely affected by magnetism.


• *SSD opens files faster than HDD.


• SDD has the best Mean Time Before Failure (MTBF).


Explanation:

A solid state drive is a flash device with a storage capacity similar to a small hard drive. Solid state drives are used as replacements for hard disk drives and store operating system, application, and data files.

Solid state drives have several advantages. They:

• Are faster than hard drives.


• Have no moving parts.


• Have lower power consumption than hard drives (which is good for laptops).


• Are less susceptible to physical damage (from dropping) and immune to magnetic field damage.


• Are smaller and lighter than hard drives.


The main disadvantage of solid state drives is cost--they are several times more expensive than comparable hard drives.

However, their advantages make them a good choice in many situations, especially for portable devices. q_itf_storagetypes_facts_06

Match the storage device types on the left with the description and benefits on the right. Answers:

• Hard disk drive (HDD)


• Solid state drive (SSD)


• Optical disc drive


Explanation:

Hard disk drives (HDD) are thick magnetic disks made of aluminum platters. They use read/write heads to access data stored on the platters. They have up to several TB in storage capacity and their cost per MB is cheap.

Solid state drive (SSD) is a flash device with storage capacity similar to a small hard drive. They are faster than other devices. They have no moving parts and last longer than other storage devices.

Optical discs use lasers to read and write information that is stored in the form of pits in their reflective coating. They are ideal for storing and playing music and video. They are portable and cheap and have a long shelf life. q_itf_storagetypes_facts_07

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

Answers:

• *Hard disk


• USB flash drive


• Optical


• SSD


Explanation:

A hard disk has a large memory capacity, is fast, and is relatively inexpensive. Optical disks are also inexpensive but are not as fast and do not provide the storage capacity of hard disks. USB flash drives are not as inexpensive as hard disks with equal storage capacity and are not available with the capacity as the larger hard disks. Solid State Drives (SSD) have a large memory capacity and are fast but are much more expensive than comparable hard drives. q_itf_storagetypes_facts_08

Which of the following is not an advantage of SSDs over HDDs? Answers:

• *Inexpensive


• Low power consumption


• Durable


• Small and light


Explanation:

Solid State Drives (SSDs) are generally more expensive than hard disk drives (HDDs). Some advantages of SSDs over HDDs include the following:

• They are faster

• They have no moving parts so they last longer


• They have lower power consumption


• They are less susceptible to physical damage (from dropping) and immune from magnetic fields


• They are smaller and lighter


q_itf_storagetypes_facts_09

Which of the following are optical storage devices? (Select three.) Answers:

• USB flash drive


• HDD


• *DVD


• SSD


• *BD


• *CD


• SDHC


Explanation:

Optical storage devices use lasers for both reading and writing information. The following are all optical storage devices:

• CD (Compact Disc)


• DVD (Digital Video Disc or Digital Versatile Disc)


• BD (Blu-ray Disc)


HDDs (Hard Disk Drives) are magnetic storage devices. A flash device stores information using programmable, non- volatile flash memory. USB flash drive, SSDs (Solid State Drives), and SDHC memory cards are flash devices. q_itf_storagetypes_facts_10

A company executive has been experiencing slowness when her laptop boots. After performing some diagnostics and troubleshooting, you determine the hard drive has sufficient free space and it is rated as a 5400 RPM drive. You decide to defragment the hard drive. After the drive is defragmented, the laptop boot performance has not improved. Which of the following internal computing components would MOST LIKELY resolve the performance issue?

Answers:

• *Replace the hard drive with an SSD


• Replace the hard drive with a larger capacity


• Increase the amount of RAM


• Upgrade the firmware/BIOS


Explanation:

Replacing the hard drive with a Solid State Drive (SSD) will provide the greatest impact. Boot times have been reduced from several minutes to a matter of seconds by replacing a hard drive with an SSD.

Since free space is not an issue, replacing the hard drive with greater capacity will not speed up the boot process. Adding additional memory would help performance after booting.

Upgrading the firmware/BIOS would not increase boot performance. q_itf_storagetypes_facts_11

Which of the following has the ability to store user data even if the power to the computer is off? Answers:

• *Hard drive


• System memory


• Cache memory


• Firmware/BIOS


Explanation:

Hard drives provide persistent storage for user data.

System memory and cache memory require a power source to store data.

Firmware/BIOS provide persistent storage while the computer is powered off, but for system settings and not user data. q_itf_storagetypes_facts_12

Sara, a user, wants to play a movie on her laptop while traveling. She recently purchased a movie on Blu-ray disc. Which of the following computer components does she need installed?

Answers:

• *Optical drive


• Hard disk


• SSD


• Flash storage


Explanation:

An optical drive capable of playing a Blu-ray disc is required. The hard drive, SSD, and flash storage are not capable of playing a Blu-ray disc.

q_itf_storagetypes_facts_cloud

Microsoft Office 365 and Google G Suite are examples of what type of internet service? Answers:

• *Cloud-based collaborative applications


• Always-on applications


• Cloud storage


• Network attached storage solution


Explanation:

Office 365 and Google G Suit are examples of a cloud-based collaborative application. These applications are delivered using a cloud computing model and are accessed through your browser.

Always-on applications mean that you have access to your services 24/7 without the worry of an outage.

Examples of cloud storage include OneDrive, Google Drive, and DropBox. Some cloud storage services are free, and

others have business solutions.

A NAS is a device that sits on your network and provides a shared storage solution. q_itf_storagetypes_facts_das

What do you call any type of storage, whether it is an internal hard drive, an internal optical drive, an external drive, a thumb drive, or a memory card, that has been shared on a computer connected to a network for other computer to use? Answers:

• *DAS (direct attached storage)


• NAS (network attached storage)


• File server


• Cloud storage


Explanation:

DAS is a term used to describe a computer that is on a network and has many kinds of storage. Regardless of the medium, that storage can be shared so other computers can take advantage of it.

A NAS is a standalone device that can have multiple hard drives, can have more than one network interface card, and has a simple operating system that can be attached to a network and used to store or retrieve data.

A file server is a computer whose storage is accessible by clients on its network. Essentially, it is a file server. Cloud storage is a file server that is accessible through the internet. It is not on your local network. q_itf_storagetypes_facts_enclosure

Tom has an old 3.5-inch hard drive and needs a way to pull data from it. He puts the old hard drive in a device and connect it to a computer with a USB cable. What is this device called?

Answers:

• *Enclosure


• Floppy drive


• Flash drive


• Backup drive


Explanation:

Enclosers come in two types and two sizes. One type is empty. The other has a pre-installed drive (also called an external hard drive). The two sizes are 3.5-inch (which usually need an external power supply) or a 2.5-inch drive that don't need an external power supply. They connect to a computer by USB, Firewire, eSATA, or Thunderbolt.

A Floppy drive is older technology that used ether a 5.25-inch disk or a 3.5-inch disk. It could not back up much data by today's standards.

Flash drives are external devices you can use to back up computer data, but not the answer to this question.

A backup drive is either an empty encloser with a drive you install or an enclosure with a pre-installed drive. Both fall into the external drive category.

q_itf_storagetypes_facts_external

Frank has purchased a new computer; he wants to move data from his old computer to his new computer. He has quite a bit of data. What can he connect to his computers to accomplish this goal?

Answers:

• *External hard drive


• Writable CD-ROM


• Flash drive

• Cloud account


Explanation:

An external hard drive is the best choice. They come in a variety of sizes and can easily connect using a variety of connectors.

A writable CD-ROM used to be a good backup option, but with large amounts of data, it is not as good a choice as an external hard drive.

A flash drive is also a possible choice, but has size limitations.

A cloud account is also a possible choice, but the question asks for a device to connect. q_itf_storagetypes_facts_flash_01

What term is used to describe small portable non-volatile data storage devices that use flash memory modules and easily connect to a variety of devices?

Answers:

• *Flash drives


• 2.5-inch solid state drives


• 2.5-inch hard drives


• Floppy disks


Explanation:

A very popular device for storing data is a flash drive. They come in small, portable form factors and in a variety of storage capacities.

A 2.5-inch solid state drive uses flash memory, but the question is referencing a small device.

The term "hard drive" can be used to reference a magnetic drive or a solid-state drive. Again, the question is referencing a small portable device.

Floppy disks are potable, but obsolete. q_itf_storagetypes_facts_flash_02

Flash memory is used in a variety of devices and comes in a variety of form factors. Choose the terms used to describe these devices. (Select two.)

Answers:

• *Thumb drives


• *Memory cards


• Floppy disks


• Optical disks


• Zip disks


Explanation:

A term used to describe a Flash drive is a Thumb drive. This device connects to a computer using a USB connector. The term "memory card" describes the flash memory devices used in cameras and video recorders.

Floppy drives are older, obsolete devices.

Optical disks are used in CD, DVD, and Blu-Ray drives. Zip disks are obsolete devices. q_itf_storagetypes_facts_hdd_01

Which type of storage media is susceptible to data loss due to excessive jostling or movement? Answers:

• SSD


• *HDD


• Flash storage


• Optical drive


Explanation:

The most common type of long-term storage is the hard disk drive (HDD). Hard disks use thick, magnetic disks encased in a protective housing to store data. Because a hard disk drive is usually installed inside of a computer, it can be difficult to move one between systems. If you need a portable hard disk, use an external hard disk drive that uses a USB or FireWire connection to the computer. Hard disks can store a large amount of data, but because they rely on moving parts, they are prone to failure if they are shaken or jostled too much.

Solid state drives (SSD), flash storage such as USB drives, and optical drives are not susceptible to data loss due to excessive jostling or movement because they do not have mechanical moving parts. q_itf_storagetypes_facts_hdd_02

The original desktop computers used floppy disk drives to store programs and user data. What do modern personal computer use for non-volatile, long-term storage?

Answers:

• *Hard disk drives


• Zip drives


• Flash drives


• Random access memory


Explanation:

Modern personal computers use internal and external hard disk drives for long-term storage. They come in two types, traditional magnetic drives and solid-state drives.

Zip drives are old technology that used a disk similar to a floppy disk. A zip could hold more information than a floppy, but not nearly as much as a hard drive.

Flash drives are normally external devices, but solid-state drives are using the flash memory modules in internal and external devices.

Random Access Memory is volatile memory not meant for long-term storage. q_itf_storagetypes_facts_nas

Cliff needs to find a solution to a problem. He has several employees that work on team projects. He wants to find a centralized storage solution that can be used for shared storage, has enough space for even the largest files, is easy to deploy, attaches to his current network infrastructure, and is not too expansive. What device should he choose?

Answers:

• *NAS


• DAS


• Cloud storage


• File server


Explanation:

A NAS (network-attached storage) would be a cost-effective solution that is easy to administrate and comes in large storage sizes.

A DAS is a possible choice. It is a computer that has shared its storage space to client computers. It requires more administration and is not as easy to deploy.

Cloud storage is another good solution, but if the internet connection goes down, everyone losses connection to their cloud files.

A file server is considered a CAN. Its storage is shared for clients to use. It requires more administration, but is not a turnkey solution.

q_itf_storagetypes_facts_optical

What do the light and dark spots on an optical disc represent? Answers:

• Read speed


• Write speed


• *1s and 0s


• Type of disc


Explanation:

Optical drives use light, not magnetism, to store information. They use microscopic light and dark spots on the bottom surface of the disc that represent the 1s and 0s of the data.

The type of disc and the read and write speed are not determined by the light and dark spots on the disc. q_itf_storagetypes_facts_server

Stewart's friend gave him an old server. He decides to install a second NIC card and some extra hard drives. He puts the computer on his network and shares all the storage space for clients to use. What did Stewart just create?

Answers:

• *A file server


• A NAS


• A DAS


• A cloud server


Explanation:

A file server is a computer that is placed on a network and shares its storage space to be used by clients on the network. A NAS is a standalone device with a large amount of storage space that can be placed on your network and accessed by clients on your network.

A DAS is a way of sharing a file server's (or any computer's) storage to be used by clients on the network. A cloud server is a resource for keeping data that is accessed through the internet. q_itf_storagetypes_facts_ssd_01

Which of the following interfaces provides the best performance for an SSD? Answers:

• USB


• SATA


• PCI


• *M.2

Explanation:

Solid state drives can get the most performance from using the PCIe bus. The m.2 adapter allows a solid state drive to be plugged directly into the motherboard and use the PCIe bus.

USB, SATA, or PCI interfaces do not provide a better performance than m.2 for solid state drives. q_itf_storagetypes_facts_ssd_02

Henry is in the market for a new laptop. He is looking at two models. One has a magnetic hard drive. The other has a solid-state drive. The laptop with the spinning disk drive has much more disk space than the laptop with the solid-state drive. Henry is more interested in performance than size. Which laptop should he choose?

Answers:

• *The solid-state laptop


• The magnetic storage laptop


• The magnetic storage is faster


• The solid-state is slower


Explanation:

The laptop with the solid-state drive will have much better performance.

The laptop with the spinning disk drive will have more storage space, but not as good performance. A magnetic storage device does not perform as well as a solid-state device.

A solid-state device is not slower than a spinning disk drive. q_itf_storagetypes_facts_storage

Hard drives are an integral part of a personal computer. Hard drives come in two standardized form factors, or formats. What are the formats internal and external hard drives come in? (Select two.)

Answers:

• *3.5-inch


• *2.5-inch


• 5.25-inch


• 8-inch


• 5.75-inch


Explanation:

3.5-inch size hard disk drives are used in desktop computers, although a 2.5-inch will fit as well. 2.5-inch size had disk drives are used in smaller form factor desktop computer and laptops.

5.25 inches was the size of an older floppy disk. These are obsolete.

At one time, there was a floppy disk drive that used 8-inch disks. It is obsolete. There is no device disk drive that used a 5.75-inch form factor. q_itf_filesystems_facts_01

Which of the following divides a single physical disk into multiple logical drives called volumes? Answers:

• *Partitioning


• Fragmentation


• Defragmentation

• Journaling


Explanation:

Partitioning is the process of dividing a single physical disk into multiple logical drives called volumes. Fragmentation is when parts of a single file, program, or application are stored in different areas of a physical disk.

Defragmentation is a utility in which all fragmented files on a drive are found and reconsolidated into the same physical location on the disk.

Journaling is the process of tracking changes to a file so that a file can be repaired or restored in case of corruption or data loss.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_filesystems_facts_02

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

Answers:

• *Full Control


• Write


• Execute


• Read


Explanation:

A user must have the Full Control permission to set NTFS security permissions.

Write permissions allow a user to change folder or file data and attributes. Modify permissions includes all Read, Execute, and Write actions and adds the ability to add or delete files. Read permissions allow a user to view folder details and attributes.

q_itf_filesystems_facts_acl

What common method do file systems use to keep track of which users can read, write, move, or delete a file or folder? Answers:

• *Access Control List


• File sharing


• Naming rules


• File formats


Explanation:

File systems use an Access Control List, or ACL, for each file and folder in the system. The ACL keeps track of which users can read, write, move, or delete each file.

Most file systems allow users to share folders saved on their hard drive with users who are connected to the same local network or by setting up a network share. However, this is not a system for keeping track of rights to a file.

Naming rules limit which characters can be used in filenames.

A file format is the specific way data is organized in a file. Using an image file as an example, files are organized by metadata and pixel data.

q_itf_filesystems_facts_encryption

Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read

these files?

Answers:

• *Encryption


• Compression


• Zip


• Hide


Explanation:

Encryption is another security mechanism used to secure files from prying eyes. Compression does not keep a file from being read.

Zip is short for WinZip, which is a compression tool, not as encryption tool.

She could add the -h attribute to hide these files, but she may forget they are there if she is not careful. q_itf_filesystems_facts_executable

Which of the following BEST describes the file "/Users/Hannah/Rivers.js"? Answers:

• It's an image file with a "/Users/Hannah/Rivers.js" filename.


• *"Rivers.js" is an executable file in the "/Users/Hannah/" subfolder.


• "Rivers.js" is an image file in the "/Users/Hannah/" subfolder.


• "Rivers.js" is an executable file with a "/Users/Hannah/Rivers.js" filename.


Explanation:

"Rivers.js" is best described as an executable file in the "/Users/Hannah/" subdirectory.

"Rivers.js" is an executable file, not an image file. And while "/Users/Hannah" is the subfolder where the file is located, the subfolder is generally not considered part of the filename.

"Rivers.js"• is an executable file, not an image file.

While "Rivers.js" is an executable file, the "/Users/Hannah/" subfolder is generally not considered part of the filename. q_itf_filesystems_facts_ext4_01

In your Pictures folder, you have a file named "BlueSkies:Pacific-3.png". Which file system are you using? Answers:

• HFS+


• FAT32


• *Ext4


• NTFS


Explanation:

In the ext4 file system, the only reserved character is the / character, which is not used in the picture file name. All the other file naming systems reserve the ":" character, which means the file name could not be created by a user in the file system.

The HFS+ file system reserves the : character for the system itself, which means that the picture file name could not be created by a user in the file system.

The FAT32 file system reserves the : character for the system itself, which means that the picture file name could not be created by a user in the file system.

The NTFS file system reserves the : character for the system itself, which means that the picture file name could not be created by a user in the file system.

q_itf_filesystems_facts_ext4_02

What of the following is a reserved character in the ext4 file system? Answers:

• */


• ?


• :


• |


Explanation:

The ext4 file system allows all character except / to be used in a filename.

NTFS reserves the characters \ / : * ? < > | for special purposes. It doesn't allow these characters in filenames. q_itf_filesystems_facts_fat32

Ben wants to format his flash drive so it can be read on many types of devices, such as game consoles and different desktop computers running different operating systems. Which file system should he format his flash drive to so it can be used this way?

Answers:

• *FAT32


• NTFS


• exFAT


• Ext4


Explanation:

FAT32 is the best choice because it provides the best compatibility between different types of devices. NTFS is not a good choice because it will not be usable on a game console.

exFAT is not a good choice because some game consoles do not support it.

The Ext4 file system is mainly used for Linux computers and is not supported on all Windows versions. q_itf_filesystems_facts_hfs

Henry has an older MAC computer running Mac OS 8.1. He needs to format a hard drive to put in this older computer. Which file system would work BEST for this older computer?

Answers:

• NTFS


• FAT32


• *HFS+


• APFS


Explanation:

HFS+ is the best choice. It is compatible with both older MacOS versions and newer Mac OS X versions. NTFS is for the Windows operating system only.

FAT32 would work, but does not offer compression or journaling.

APFS is for Mac computers running the Mac OS X versions of the operating system.

q_itf_filesystems_facts_journaling

Which of the following file system features uses a change log to track file changes in the file system? Answers:

• Compression


• *Journaling


• Permissions


• Encryption


Explanation:

With journaling, every time a file changes, the file system makes a note in its change log to help prevent data loss. Compression is a way of making data consume less storage space.

With permissions, file systems use an access control list, or ACL, for each file and folder in the system to keep track of which users can read, write, move, or delete each file.

Encryption is the process of converting information so that it cannot be understood without a necessary key to convert it back. Encryption helps prevent unauthorized access.

q_itf_filesystems_facts_ntfs_01

A graphic designer is backing up some video files from a Windows desktop to a new 128-gigabytes flash drive. An error message appears indicating that a 6-gigabyte video file cannot be copied due to file size limitations.

The graphic designer contacts the company help desk for a solution to the problem. Which of the following would be a solution that the help desk could offer?

Answers:

• Reformat the flash drive to use the FAT32 file system.


• Reformat the flash drive to use a MacOS file system.


• *Reformat the flash drive to use an NTFS file system.


• Reformat the flash drive to use the ext4 file system.


Explanation:

The NTFS system is a Windows file system that supports a maximum file size of 16 exabytes, much more than the 6 gigabytes the video file needs.

The FAT32 file system has a file size limit of 4 gigabytes, which would not help the graphic designer.

The MacOS file system is not compatible with the Windows operating system and would not solve the problem. The ext4 file system is a Linux file system. It is not compatible with Windows file systems and would not solve the problem.

q_itf_filesystems_facts_ntfs_02

Tom has a 7-gigabyte file he wants to put on a 16-gigabyte flash drive. To be able place this large file on the flash drive, what must Tom do to this flash drive first?

Answers:

• Format the flash drive to FAT32.


• Format the flash drive to FAT16.


• *Format the flash drive to NTFS.


• Re-partition the flash drive.

Explanation:

Formatting the flash drive to NTFS will allow file sizes larger than 4 gigabytes.

Formatting the flash drive to FAT32 will not work because it only allows file sizes smaller then 4 gigabytes. Formatting the flash drive to FAT16 is the same problem. It cannot support files larger than 4 gigabytes.

Re-partitioning the Flash drive does not affect how files are stored on the device. The drive must be formatted with a file system.

q_itf_filesystems_facts_p2p

Brandon is a member of an online gaming community that makes files available to each other from their local hard drives. Which of the following BEST describes this file system feature?

Answers:

• Permissions


• NTFS (New Technology File System)


• *P2P (peer-to-peer) sharing


• Hierarchal file system


Explanation:

P2P (peer-to-peer) file sharing allows a group of users to share folders saved on their local hard drives as long as they are connected to the same local network. Brandon and the other members of the online gaming community are connected to the same local network when gaming.

Permissions are the actions (read, write, move, delete, etc.) users can perform on a file. While the members of the online gaming community need to make sure that the local shared files provide adequate permissions, the ability to share the files is best described by P2P file sharing.

NTFS (New Technology File System) is a file system that provides features for naming and organizing files and directories and allows file sharing. However, P2P best describes the type of file sharing the online gaming community is using.

A hierarchal file system describes the organization of directories, folder, subfolders, and files. It does not encompass file sharing.

q_itf_filesystems_facts_reserved

Sally is trying to name a folder "Student Grades/1st Period"•. She keeps getting an error message that reads "The file name cannot contain these characters.". What is wrong with her folder name choice?

Answers:

• */ is a reserved character.


• The space between "Student" and "Grades" is not allowed.


• The name must be in lowercase characters.


• The number 1 is not allowed; it must be changed to an alpha character.


Explanation:

/ is a reserved character, which cannot be used in a folder name. The list of reserved characters differs depending on the file system. NTFS has the longest list of reserved characters, and ext4 has the shortest (only one the / character.•) Spaces between words are allowed.

The name does not have to be all lowercase. It can be a combination of upper- and lower-case letters. Numbers are allowed in filenames.

q_itf_filesystems_facts_tar

Which of the following file extensions indicates a compressed file? Answers:

• *.tar

• .wma


• .js


• .run


Explanation:

Unix and Linux use a .tar extension for archiving. It does not compress unless it has the .gz extension added, as in file.tar.gz.

A .wma extension indicates an audio file.

A .js extension indicates a JavaScript executable file. A .run extension indicates a Linux executable file.

3.6 Hardware Troubleshooting Section Introduction

As you study this section, keep the following questions in mind:

• How does a malfunction in one part of the computer affect the rest of the system?


• What is the most effective way to troubleshoot a problem?


• Why should I troubleshoot a problem before implementing a potential solution?


After finishing this section, you should be able to:

• Identify the proper sequence of steps to follow in the troubleshooting methodology.


• Diagnose and resolve common motherboard problems.


• Diagnose and resolve common computer memory problems.


• Diagnose and resolve common processor problems.


• Diagnose and resolve common disk storage problems.


• Diagnose and resolve common computer display problems.


Key terms for this section include the following:

Term Definition


Troubleshooting

A process that combines knowledge, experience, and intuition to quickly identify the cause of a problem.


Data Corruption

A memory issue in which unintentional changes have been introduced to your original files resulting in missing files or data, scrambled documents, crashing programs, spontaneous reboots, registry errors, and missing systems.


Power-on Self Test (POST)

A test that ensures that all the system's hardware is in working order before loading the operating system. During this test, an error message may display on the screen notifying you of the faulty component.


Beep Codes

An audible alarm that occurs when a computer encounters an issue before a power-on self test (POST) has completed when booting. The number and frequency of the beeps can be used to compare information found in the motherboard manual and identify the issue.


3.6.1 Troubleshooting (Lesson Video) Transcript:

If you use a computer for long enough, eventually something is going to go wrong. A piece of hardware may stop working, a program may cause your computer to crash, or your system may stop working altogether.

Computer problems can be caused by a wide array of issues. We can't even begin to cover all of them here. Instead, in this video, we want to focus on using a standardized process for troubleshooting computer issues. By using a standardized process, you can adapt to, confront, and resolve a very broad range of problems.

The model we're going to present here is by no means all-inclusive. You may need to add, remove, or reorganize the steps we're going to talk about to match a particular situation. However, this model should give you a good base to start from.

Before we begin, you should understand that many computer users make a catastrophic mistake when they start troubleshooting system problems. Instead of using a methodical troubleshooting approach, they start trying to implement fixes before they even know what the problem is. This is called shotgun troubleshooting. The person tries one fix after another, hoping that one of them will just magically repair the problem. This is a dangerous and bad practice. People using this approach often cause more problems than they solve.

Instead of using a shotgun troubleshooting approach, you should use a standardized troubleshooting model. The goal of a troubleshooting model is to concretely identify the source of a problem before you start trying to fix things.

I know that sounds simple, but many people struggle with this basic concept. So, here is a suggested troubleshooting model that you can use to develop your own personal troubleshooting methodology.

Step one, identify the problem. This is critical. You need to determine exactly what has happened. What were the symptoms? Were there any error messages displayed? What did those error messages say? How extensive is the problem? Is it isolated to your system, or are other people experiencing the exact same problem?

Step two, identify what has changed. In this step, you should identify what's changed in the system. Has any new software been installed? Has a new piece of hardware been installed? Did the user change something? Did you change something?

Step three, create a hypothesis. With the information gathered in the preceding steps, the next step is to develop several hypotheses that could potentially explain the problem.

To do this, you may need to do a lot of research. You should check frequently asked questions and knowledge bases that are available on the internet. Using this information, narrow down the results to the one or two most likely causes.

Step four, determine what the appropriate fix should be. Notice, we haven't fixed anything yet, we're still figuring out what the problem is and how we're going to fix it. In this step, we review knowledge bases, other websites, and our own experience to identify the steps that are needed to fix the problem.

As you do this, you need to be sure to identify and account for any possible ramifications that might occur when you implement this fix. Many times, the fix itself may have side effects that are just as bad or worse than the original problem that you're trying to solve.

Step five, implement the fix. Notice that we've gone through many, many steps before trying to fix the problem. At this point, we're ready. We've done the research, we've identified the problem, we know what the resolution is, and now we implement the fix.

Notice in this troubleshooting model that we did a ton of research before we started step five where we implement the fix. This is important. Doing so greatly increases the likelihood of successfully troubleshooting the problem.

Step six, verify functionality. After implementing the fix, you need to be sure to verify that the fix actually repaired the problem and that the issue doesn't reappear again. If you're still experiencing the problem, or if a new problem appeared, it's back to step one.

Step seven, document the solution to the problem. You need to make sure that you write things down. What happened and how did I fix it? That way, if this problem occurs again in a year or two, you can quickly identify the problem and already know how to fix it without having to go through the entire troubleshooting process again.

If you use this methodology, you can learn to be an effective troubleshooter as you gain hands-on experience in the real world.

In this video, we emphasized the importance of using a standardized troubleshooting model when troubleshooting system problems. First, identify the problem. Second, identify what has changed. Third, create a hypothesis. Fourth, determine the appropriate fix. Fifth, implement the fix. Sixth, verify functionality. Last, document the solution.

Remember, you can always adapt this process for your individual needs. The important thing is that you create a troubleshooting plan and follow it.

3.6.2 Troubleshooting Facts

Good troubleshooting is a process that combines knowledge, experience, and intuition. As you practice service and support in a work environment, you will add to your troubleshooting skills and develop intuition that will help you to quickly solve a variety of problems.

This lesson covers the following topics:

• Troubleshooting guidelines


• Troubleshooting steps


• Troubleshooting tips


Troubleshooting Guidelines

As you begin to learn how to troubleshoot keep in mind that the issues will have thee major components:

• Cause - All issues are a result of something happening that caused the problem. For example, a network interface card (NIC) may have failed.


• Symptom - The symptom is what you or others are seeing as a result of the cause. In the case of a bad NIC, the symptom would be loss of connectivity to the network and internet.


• Consequence - The consequence is how the problem is affecting productivity. For example, if a NIC has failed, the user is unable to get any work done. Keep in mind that fixing the consequence is often more important than what you do to fix the cause. For example, a new network card could be purchased and installed. If that is going to take a long time, a company may prefer to purchase a new computer if one can be obtained immediately.


Before attempting to troubleshoot and fix an issue on a computer, be careful what you try. If you do the wrong thing, you may cause more damage.

At first, try the basic troubleshooting steps that can often be found in documentation provided by the manufacture. In many cases you may also find additional troubleshooting information on the manufacturer's or company's website.

For example, the TestOut's website has a link at the top of the page labeled Support. Use this link to find support for many different areas, such as student resources, K12 Education, Knowledge Base & FAQ, etc. If the web site is dealing with hardware or software, you may find information about such things as drivers and patches that may help solve the issue.

When working with Windows (or other applications), you can often get help and tips by pressing the F1 key. Windows 10 also provides a Tips app, which can be accessed by typing Tips in the search box.

Large companies often employ individuals who can fix issues you may run across. This group of individuals is often referred to as the help desk. If the company you work for has a help desk, you should contact it.

Since finding technical support directly from the manufacture can sometime be difficult, many technical community groups have been formed in which individuals from around the world offer their help and expertise. Although these can often be helpful, remember that they may not be sanctioned by the manufacturer and you should be cautious about implementing suggestions.

A company may have technical community group or forum you can find information about systems or software you have purchased. These forums are sanctioned by the company and questions posted on these forums are often answered by the manufacture's employees.

Troubleshooting Steps

Regardless of your current troubleshooting abilities, you will benefit from following a systematic approach to problem solving. The following process has proven effective in a variety of situations:

Table 1: OS Functions and Descriptions

Step Description


1. Identify the

When identifying the problem, resist the urge to start fixing things. To identify the


2. Research

Check knowledge base articles, network topology diagrams, the internet, and any other


3. Back up the system

Before making changes to the system, back up user and system data (or make sure a


4. Identify possible

Check for simple, obvious, and comm


5. Test your theory

Test your theory to verify the cause of the problem.


6. Create an action plan

Create an action plan that will address the most likely problem, the steps that wil


7. Test the solution

When you test the solution, do the following:

8. Ensure

After the problem is fixed, ensure the customer'


9. Document the Documenting t


Remember that troubleshooting is a process of both deduction and induction. Experience will tell you when deviating from this process can save both time and effort.

If you are preparing to pass the CompTIA IT Fundamentals FC0-U61 exam, you will need to be familiar with the precise order and wording of the troubleshooting steps published by CompTIA. To pass the exam, we recommend that you memorize these steps. They are slightly different than the steps we've discussed previously.

CompTIA Troubleshooting Steps :

1. Identify the problem. o Gather information.


o Duplicate the problem, if possible.


o Question users - Identify symptoms.


o Determine if anything has changed.


o Approach multiple problems individually.


2. Research knowledge base/Internet, if applicable.


3. Establish a theory of probable cause. o Question the obvious.


o Consider multiple approaches. . Divide and conquer.


4. Test the theory to determine the cause. o Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem.


o If the theory is not confirmed, establish a new theory or escalate.


5. Establish a plan of action to resolve the problem and identify potential effects.

6. Implement the solution or escalate as necessary.


7. Verify full system functionality and, if applicable, implement preventive measures.


8. Document findings/lessons learned, actions, and outcomes.


Troubleshooting Tips

Keep in mind the following tips when troubleshooting systems:

• Often the hardest part of troubleshooting is to reproduce the problem. You might need to ask the user questions to identify exactly how the problem occurred. You might need to watch them perform the task again to reproduce the problem.


• If a hardware device or a software program causes a specific error, check the manufacturer's website for additional help in troubleshooting the error.


• To help diagnose issues, you can run special software tools supplied by the hardware manufacturer.


• In addition to a basic toolkit, keep on hand a few spare parts that you know to be in working order. If you suspect that a component has failed, replace it with the known good spare. If that solves the problem, replace the faulty component.


• Intermittent problems are particularly difficult to troubleshoot. Check for environmental conditions such as kinked cables or overheated components.


• If you have problems identifying a hardware error, you can simplify the system by removing all but necessary components (processor, memory, and hard disk). Add devices one at a time and restart the system. If an error occurs, remove the newly added device and troubleshoot that device. Another strategy would be to remove a single device and restart the system to see if removing that device corrects the problem.


• Some problems might be caused by software errors, not hardware failures. You might need to begin by updating the drivers or uninstalling software.


• Before you make changes, always consider corporate policies and procedures and the change's impact on other people and components.


3.6.3 Motherboard Troubleshooting

The motherboard, or mainboard, is the largest board in the computer's chassis. It allocates power and allows communication between the CPU, RAM, and other hardware components. Since motherboards can be expensive to replace, diagnosing the hardware failure on your own can help reduce or even eliminate repair costs. This lesson will help you diagnose two common causes of motherboard failure.


Motherboard.

Photo by Michael Dziedzic on Unsplash Physical Damage

A motherboard issue may present itself in a variety of ways, such as random freezing, the blue screen of death (BSoD), or an unusual burning smell. These issues can be challenging to diagnose since there can be several variables involved. One variable that's easily ruled out is physical damage. Disconnect the power from the computer immediately, especially if you smell something burning. Then, open up your computer's case and check for damaged components. Overheating is usually the cause of damaged capacitors and wires and can often be to blame for a failing motherboard.

If you find physical damage on the motherboard, it will require in-depth repair by a computer technician. They may be able repair the motherboard by replacing individual wires or capacitators, but in some cases the entire motherboard will

need to be replaced. The computer technician will also verify that other components didn't cause the failure. For example, an overheating CPU may have caused physical damage to the motherboard and will also need to be addressed. Checking for Physical Damage and Overheating

For this process, you'll need a Phillips-Head screwdriver. To check your computer for physical damage, you want to turn off your computer as your normally would. Then, unplug the computer from its power source and remove all external cables attached to it (show removing USB devices, ethernet cable, etc.). You can then begin to remove the side panel from your computer. You can do this by removing the outermost screws from the outer case using your screwdriver.

Once the screws have been removed, the side panel can then be removed. Sometimes the panel will need to be slid or lifted in to come loose. Then, begin looking for damage by shining a flashlight on the motherboard. You will want to look for damaged capacitors, burn traces along the surface of the board, or cracks in the board itself. If physical damage to the motherboard is found, it will require repair by a computer technician in most cases.

Faulty Power Supply

If your computer doesn't power on at all, spontaneously restarts, or fails during bootup, your power supply unit (PSU) may be failing. To rule this out, you want to plug the power cable securely into the computer and then into the wall outlet. Next, turn the computer on. Most computer models have a light that glows when the computer has power. If it doesn't glow, try a different power cable and confirm that your outlet has power. If the power source and cable seem to be in working order, you can then test the PSU by using a device called a power supply tester. In many cases, PSU failure is a result of a poor handling, a power surge, or subpar equipment.

If the power supply is identified as the faulty component, it typically needs to be replaced. A PSU can be tough to replace because of its large number of connections, so make sure to verify that the new one is the correct voltage and size and that all components are properly connected.

Performing the Paperclip Test

To perform the paperclip test, you will want to disconnect the power cord from its power source and supply. Turn the I/O switch on the back of the power supply to "O," or Off. Then unplug all hardware and devices from the computer. Open up your computer and disconnect the power supply from the motherboard by removing the 24-pin connector. Next, re-plug the power cord into the power source. Make sure you're plugging the power cord directly into the power source in order to rule out a faulty surge protector or UPS. Then, take a paperclip and bend it into a U-shape. On the 24-pin connector, locate the green wire that goes into pin 16. Insert one end of the paperclip into pin 16. Next, insert the other end of the paper clip into pin 17. This will have a black wire going into it. Lastly, flip the switch on your power supply to the "|" position, or On position. If the power supply fan doesn't run, your power supply is faulty.

3.6.4 Memory Troubleshooting

This lesson covers the following topics:

• RAM issues


• Data corruption


• Computer memory errors


• Memory error troubleshooting


• Causes and prevention of memory errors


RAM Issues

Random access memory (RAM) keeps track of the instructions and values the computer is working with at a given time. If memory isn't working properly, you may see a variety of problems from crashes and stalls to being unable to boot the computer.


Two RAM sticks on top of a motherboard. Photo by Michael Dziedzic on Unsplash Data Corruption

All data passes through the memory at one time or another. Data corruption is often a cause of memory problems. It's important to remember that data corruption can indicate a hard drive issue as well.

Data corruption means that unintentional changes have been introduced to the original files. If you open a corrupt document, you may see that the text has been scrambled or that there are random blotches on an image.

If your computer is experiencing data corruption, the following things may occur:

• Files or data go completely missing.


• Files appear scrambled once they're opened.


• Programs crash frequently.


• The computer reboots spontaneously.


• The computer reports registry errors.


• The system reports that system files are missing.


Computer Memory Errors

If your computer is experiencing memory errors, the following things may occur:

• The computer reports a memory error.


• The computer boots fine, but its performance diminishes the more you use it.


• The computer reboots at seemingly random times with or without a blue screen that flashes briefly beforehand.


• The computer does not recognize the installed memory.


• You are unable to install new programs.


• The computer doesn't boot up and only beeps.


• The computer boots but the screen remains blank.


Troubleshooting Memory Errors

One reason you might experience memory errors is that the memory card isn't properly installed or has come loose. Also, the socket that the memory card is seated in might have gone bad or needs cleaning. The following steps can help you diagnose and fix the issue.

1. Make sure that the memory card is compatible for the computer, especially if you're getting errors after installing new memory on the system. Compatibility specs can be found on the manufacturer's website.


2. Confirm that you've configured the memory correctly. The correct configuration depends on the kind of computer you're using. The documentation that comes with the computer, the manufacturer's website, or the the manufacturer's technical support are all good resources to find the configuration the computer requires.


3. If everything is installed correctly, try re-installing the memory module. Push the module firmly into the socket until you hear a click. Then, compare the height of that module to the surrounding modules to make sure it has a similar height.


4. If the above steps don't fix the problem, try removing any newly installed memory and see if the problem persists. You can also try swapping the memory into different slots. If the memory works in one socket but not in another, the problem may be with the socket and not the memory module.


5. If a socket isn't working, you can clean the socket to see if that improves the situation. First, use a gentle cloth and

wipe the pins on the module. You can then use compressed air to blow any built-up dust from the socket. There are also special kinds of cleaners that you can purchase at computer equipment stores. Do not use a solvent as this can cause further damage to the socket.


6. Finally, try to update the BIOS information, especially if you've recently upgraded the memory. The BIOS is regularly updated by motherboard manufacturers. These updates can help to fix bugs that crop up during the life cycle of a particular motherboard. If the BIOS is not up to date, it can contribute to memory problems.


7. If none of these steps work, you may have faulty hardware. If the computer is still under warranty, contact the manufacturer to schedule a repair or replacement.


Causes and Prevention of Memory Errors

There are many issues that can contribute to damaged memory and data corruption. A few of these issues are:

• Power surges.


• Electrostatic discharge when handling computer components.


• Excessive heat inside the computer.


• A faulty memory module (manufacturer error).


In order to prevent future problems:

• Always use a surge protector for the computer and its equipment to protect from power surges.


• If you're working on the inside of the computer, wear an anti-static bracelet to make sure that built-up static electricity doesn't harm the computer's internal components.


• Keep the computer and its fan free of obstructions so it doesn't overheat.


3.6.5 Processor Troubleshooting

This lesson covers the following topics:

• Central processing units (CPUs)


• Power source issues


• Beep codes


• Overheating, improper seating, and bad CPU


• How to clean a computer


• How to reseat the CPU


CPUs

A processor, also known as the CPU, is the brains of the computer. When the CPU isn't working properly, the computer isn't able to perform at its best. This lesson will help you troubleshoot some common CPU issues you may encounter.


Processor chips seated on a motherboard.

Photo by Olivier Collet on Unsplash Power Source Issues

If you encounter a computer that won't turn on (no sounds, lights, or fans), it's important to check the power source. This step may save you hours of troubleshooting. A loose or unplugged power cable is one of the main reasons a computer doesn't turn on.

To test a power issue with a computer:

• Make sure the machine is off. To do this, remove the power cord from the power source.


• Plug a lamp that's in working order into the same power source. If the lamp works, you know that the power source is good.


• Attach the power cord securely in the back of the computer and into the power source.


• Reboot the computer.


If there's still no power to the computer, you can then continue troubleshooting other possible issues. Beep Codes

If the computer has power, it'll run a power-on self test (POST) when booted. This test ensures that all the system hardware is in working order before loading the operating system.

During this test, an error message may display on the screen notifying you of the faulty component. However, if the computer encounters an issue before POST has completed, an audible beep code will occur.

It's important to note the number and frequency of those beeps. Are the beeps long or short? Do they repeat? Beep-Beep- Beep and Beep-Beep indicate two different issues. You can use this to compare information in the motherboard manual. When referencing the manual, keep in mind that beep codes may also be referenced as BIOS error beeps, BIOS beep codes, POST error codes, or POST beep codes.

If you don't have the motherboard manual, it can be downloaded from the manufacturer's website. To download this information, you'll must know the make and model of the computer.

Overheating, Improper Seating, and Bad CPU

Overheating is a common reason that the CPU may not be performing at its best. The CPU contains a mass of tightly packed circuits that are normally topped with a heat sink and fan to disperse heat. Key points regarding CPU cooling include:

• A heat sink (typically a piece of metal with many fins) is a passive heat exchanger that transfers the heat generated by the CPU and requires good airflow to work well.


• In between the heat sink and/or fan is a substance known as thermal paste. This allows for the efficient transfer of the heat from the CPU to the heat sink or fan.


• Thermal paste is effective because it fills in the microscopic gaps between the CPU and the heat sink. If these gaps aren't filled, the effectiveness of the heat sink is reduced.


• Since many heat sinks can be big and bulky, newer thin computers, such as laptops often use heat spreaders instead.


• A heat spreader transfers energy as heat like a heat sink does, but instead of using a piece bulky peace of metal, it uses plate or block of material having high thermal conductivity, such as copper, aluminum, or diamond.


• A heat pipe is another type of heat transfer device which contains fluid inside a sealed cased. When the fluid heats up, it moves to a different part of the computer where it cools down. The liquid then returns to the hot interface and the process continues.


The primary cause of rising CPU temperatures is dust buildup. Dust commonly accumulates on a computer's cases over time, clogging fans, blocking air flow, and eventually causing ventilation issues. Making sure the computer's fans are clean and unobstructed will allow the proper air flow for the PC.

After you've properly cleaned the heat sink, fans, and vents, check for charring on and around the CPU. This is a good indication of permanent damage to it that will most likely require it to be replaced. If no charring is noted, reboot the computer to see if the overheating issue has been resolved.

If the beep code still indicates overheating, more in-depth tactics are needed. How to Clean a Computer

To keep a computer working its best, it's recommended to clean the inside every 6 to 12 months. For this process, you'll need a Phillips-head screwdriver. Follow these steps:

• Turn off the computer.


• Unplug the computer from its power source.


• Remove all external cables attached to it.


• Remove the screws from the side panel from the computer. Start by removing the outermost screws from the outer case.


• Remove the side panel when the screws have been removed, Sometimes you must slide or lift the panel to remove it.


• Use compressed air to dust the internal components of the computer. Stay a few inches away and use short bursts of air.


• Pay extra attention to fan blades, the heat sink, and vents. Make sure that they're cleared of all dirt and dust. If the buildup on the fan or heat sink is too heavy, you may need to remove them in order to properly clean them.


To avoid damaging equipment with electrostatic discharge, place your hand on the metal chassis or case prior to disconnecting the fan or heat sink.

If you remove the heat sink, you must remove the thermal grease from the CPU and heat sink. You must reapply it before reattaching them. These steps can be found in Video 3.

If a beep code or on-screen error message still indicates an overheating issue with the CPU after being properly cleaned, verify that the fan is running. When the computer is booted, listen for the fan. If you don't hear it, check that all cables are properly secured for the fan and heat sink. If the cables are secured but the fan is still not running upon bootup, this may be the cause of the overheating issue.

How to Reseat the CPU

As the CPU heats up and cools down, it can gradually become unseated from the motherboard. This can also cause damage to the cooling compound that surrounds it. Though rare, this can cause major issues with your computer, resulting in a beep code or on-screen error during POST.

Try removing the CPU and reseating it in its socket. If reseating the CPU doesn't resolve the issue, try replacing it with another functioning CPU. If the computer then boots up error free, you have determined the CPU to be faulty. This tactic may also be used when the beep code or on-screen error indicates a bad CPU.


Unscrewing the outer case of the processor chip on the motherboard. Photo by Thomas Jensen on Unsplash

To reseat the CPU, you'll need a Phillips-Head screwdriver, anti-static cloth, thermal grease, and thermal grease remover. Follow these steps:

• Turn off the computer.


• Unplug the power cable from the back of the computer.


• Remove all external cables attached to it.


• Remove the screws from the side panel from the computer. Start by removing the outermost screws from the outer case.

• Remove the side panel when the screws have been removed, Sometimes you must slide or lift the panel to remove it.


• Locate the heat sink and CPU. These are often located near the RAM.


To avoid damaging equipment with electrostatic discharge, place your hand on the metal chassis or case prior to disconnecting the fan or heat sink.

• Disconnect the cable connecting the fan to the motherboard.


• Remove the screws that secure the heat sink to the computer.


• Twist or wiggle the assembly to loosen the seal bonding it to the top of the processor.


• Lift up the heat sink and fan.


• Lift up the lever securing the processor to its socket.


• Lift the processor from its slot on the motherboard, but be careful when handling the CPU. Try not to touch the pins located on the bottom.


• Use an anti-static cloth and thermal grease remover to wipe off the residue on the top of the CPU and the bottom of the heat sink assembly.


• Line up the bevel on the processor with the bevel on the socket and place the processor back onto the socket.


• Confirm that the processor is aligned properly with the slot. Do not exert too much force or you can damage the CPU.


• Push down the lever to lock it in place.


• Apply a small dollop of thermal grease to the top of the processor.


• Use the small paddle packaged with the thermal grease to spread it in a thin layer on the surface of the CPU.


• Reinstall the heat sink, making sure good contact is made.


• Replace the heat sink, fan, screws, and cables, and place the side panel back on.


• Plug the computer back into the power source and boot it up.


3.6.6 Storage Troubleshooting

If your computer's storage is experiencing issues, you may not be able to save new data, or you may lose data that you've previously saved. Storage issues can also cause your computer to perform sluggishly. This lesson will discuss how to troubleshoot storage issues and restore or prevent data loss.


Hard disk drive.

Photo by Denny Müller on Unsplash Storage Errors

To keep your computer running smoothly, a good guideline is to keep at least 10 percent of your hard drive free. The more cluttered your computer is, the more difficult it will be to access files quickly.

If your computer's storage is full, you may notice the following:

• Your computer runs more slowly than normal

• Your computer freezes or crashes


• You aren't able to save files


• You get storage errors when trying to complete actions


Troubleshooting Storage Errors

A common reason you might be experiencing storage errors is that your hard drive is full and needs to be cleared out. There are several ways to fix this.

Delete Unneeded Files

If you have files that you know you no longer need, you can simply delete them from your hard drive. Once you've finished deleting files, empty the Recycle Bin. The computer won't free up memory space on your hard drive until you've done so. The Recycle Bin is a safety measure that prevents you from accidently deleting something you didn't mean to delete. Anything in it can be retrieved until you empty it.

Not all kinds of files take up the same amount of space. Video and audio files typically take up the most space, followed by image files, and finally by documents, presentations, and spreadsheets. Keeping this in mind can help you prioritize which files to delete. For example, it usually takes deleting many document files to free up the same amount of space as a single image or video file.

If you don't wish to delete these large files, you can move them off your hard drive onto an external device, such as a flash drive, an external USB, or an SD card. You could also move them to a cloud storage service.

Uninstalled Unneeded Programs

Uninstall any programs that you're no longer using. Many programs require a great deal of space on your hard drive, and so uninstalling unnecessary programs can be a great way to clear up space quickly.

Use Windows Disk Cleanup

Windows has a utility called Disk Cleanup that can help you find ways to free up extra space on your hard drive. If you're running low on space, Windows may automictically prompt you to use Disk Cleanup. But you can also run it manually by searching for disk cleanup in the search bar.

You will see a list of things that you could possibly delete, such as unneeded temporary files, downloads, or things in the Recycle Bin, along with how much space you could gain by deleting each category of files. Simply click the checkbox to the left of each category you want to delete and press OK when you're done.

Using External Storage

Take the following steps to use an external storage device.

1. Examine the flash drive or other media and figure out what kind of slot it requires. Many of these require a simple USB port. Make sure that you have one of the proper ports on your computer. If not, you might need to secure an adaptor to assure that the media can interact with your computer.


2. Place the external media into the matching port and wait for the computer to recognize it. Many operating systems play a brief series of tones to indicate when a new device has connected with the computer. Open up a File Explorer window and look on the left-hand side to see if you can find your device's name. Click on the device's name and you'll see the files and folders already on the external media.


3. After these steps, it's simply a process of locating the files you want to transfer on your computer and dragging them into the window that represents your external media. Depending on how large the transferred files are, you may need to wait anywhere from a few seconds to a minute or two for the files to transfer onto the external device.


4. Once the transfer has completed, you need to safely eject the external storage from your computer. Do not simply remove the device from the computer without ejecting it first, as this can cause data loss. In Windows, you right-click on the device's name and then select Safely Eject Device. A dialogue box will appear to tell you that the device has been safely ejected, upon which you can safely remove the device from its slot.


Verifying Fixed Storage Errors

To verify that you have fixed memory errors, you can take the following steps:

• Try saving a large file (such as an image or video) on your hard drive. If no memory storage errors appear, you've likely cleared up enough space on your computer.


• Reboot your computer and try to run several programs at once to see if your computer stalls or crashes. If the computer runs more smoothly, you've likely cleared up enough space on your hard drive.


Troubleshooting Hard Drive Errors

Another reason you may run into storage issues is that your hard drive itself is having trouble and might need to be repaired or replaced. Hard drives are delicate, complex things that require specialized knowledge and equipment to repair. So, you should not attempt to directly repair a hard drive yourself. If your drive is failing, there are certain steps you can take to try to preserve your data.

Step 1: Listen for strange sounds that your hard drive is making.

If your hard drive makes clicking or grinding noises when it starts up, this is a major warning sign that indicates a mechanical problem (your drive will almost certainly fail soon). If you hear the "hard drive death rattle," immediately back up your files to another device.

Step 2: Turn off your computer and keep it off.

If you think your hard drive is failing, turn off your computer and keep it off. A failing hard drive can accidently write over data that you didn't mean to erase. The best policy is to keep the hard drive off until you can get it repaired.

Step 3: Check the internal connections and cables.

All hard drives have certain cables that supply the drive with power and other cables that relay information to and from the drive. After putting on an anti-static bracelet, you can open your computer and make sure that both the power and data cables are securely inserted and that none of the cables are damaged or frayed.

Step 4: Call a licensed technician to preform repairs.

Call a licensed technician, and be sure to tell them the information you gained in the previous steps and the troubleshooting steps you've taken with the cords.

If problems persist, it may be that the best option is to simply replace the hard drive altogether. Verifying Hard Drive Functionality

If you've repaired or replaced your hard drive, you should test it out to make sure things are running smoothly. Do the following:

• Boot up your computer and listen for sounds. If your hard drive boots up without extra beeps, scraping, grinding, or clicking sounds, this is a good sign.


• Run various programs and try to save files. If you're able to run multiple programs without stalling and crashing and you're able to save files, this is an indication that your hard drive is working properly.


Replacing a Hard Drive

Once you've secured a new hard drive, you can follow these steps to replace it.

1. Make sure your computer is completely powered down and that you're wearing an anti-static wristband to prevent damage to your computer through static electricity buildup.


2. Open your computer's case according to manufacturer instructions. Locate the hard drive and remove the power and data cables from the drive. See if the hard drive is kept in place by small screws. If so, unscrew these before sliding the drive out of its bay.


3. Plug in the power connectors first for the new drive and then the data cords in the order suggested by your new hard drive's documentation. Slide the new hard drive into the bay and secure it with the screws if necessary.


4. Finally, replace the case on your computer.


3.6.7 Troubleshoot System Power (Demo Video) Transcript:

In this lab, you're troubleshooting a computer that won't turn on. If pressing the power button does nothing, the power supply is a likely culprit.

First things first – let's make sure it's plugged in. It would be a shame to spend hours troubleshooting only to find out the computer wasn't plugged in. If we zoom in on the power supply, lo and behold, there's no plug. Over here on the surge protector we have a partial connection. One end is plugged into the power strip and the other end is unconnected. Let's fix that right now.

Now let's try the power button again. Well darn. Let's check the back again. If we look closely, we can see that the black power switch is turned off. Click it to switch it to on. Now let's try that power button again.

Well darn. Let's check the back of the power supply one more time. If we look really closely, we can see that the red switch is set to 230 Volts. However, this computer needs 115 Volts. Click the switch to change its setting.

One more time, let's try the power button. Fingers crossed…and it worked!

3.6.8 Troubleshoot System Power (Simulation) Scenario

You are the IT administrator for a small corporate network. Over the weekend, another employee in the IT department upgraded some components in the Support workstation. When a Support employee came to work this morning, his computer would not start.

In this lab, your task is to troubleshoot the problem and take the necessary steps to get the computer to start. Examine the computer to identify possible problems that would prevent it from coming on.

• Make sure the power cord between the computer and the power strip is plugged in.


• Make sure the power supply voltage is set to 115V.


• Make sure the power supply switch is on.


Explanation

In this lab, your task is to troubleshoot the problem and take the necessary steps to correct the problem so the computer will start.

Complete this lab as follows:

1. Replicate the problem as follows:


2. On the computer, click the power button. A message tells you the computer did not come on.


3. Click OK .


4. Above the computer, select Back to switch to the back view of the computer.


5. Examine the computer to identify possible problems that would prevent it from coming on. Be sure to check the power cord and power supply switches.


6. Provide power to the computer as follows: a. Above the power strip, select Partial Connections .


b. Under Selected Component, drag the unconnected power connector to the power outlet on the computer.


c. Above the computer, select Front to switch to the front view of the computer.


d. On the computer, click the power button. A message tells you the computer did not come on.


e. Click OK .

7. Above the computer, select Back to switch to the back view of the computer.


8. Switch the power supply voltage to 115V .


9. Turn the power supply switch on.


10. Above the computer, select Front to switch to the front view of the computer.


11. On the computer, click the power button. If successful, the screen will change to the BIOS and operating system load screen.


3.6.9 Troubleshoot Memory (Demo Video) Transcript:

In this lab, you need to troubleshoot a computer. If we press the power button, we get a black screen with a beep code. According to the motherboard's documentation, this particular beep code means there's a memory problem. Let's look inside.

There are four RAM modules installed. At least one of them is bad, but we don't know which. So, we'll try them one at a time. First, let's try DIMM1. Nope, this one's broken. Let's take it out and try DIMM2. This one's working just fine. We can leave it in place while we try DIMM3. This one's also working just fine. Let's move on to DIMM4. This one's also busted. Since DIMM5 and DIMM6 are known good spares, we don't need to test them individually.

Once Windows loads, we can view the system settings by clicking Start, then clicking the gear icon. Click System, then About. This system has 8 GB of RAM, which means all four 2 GB modules are working correctly.

3.6.10 Troubleshoot Memory (Simulation) Scenario

You work at a computer repair store. A customer reports that his computer will not boot to Windows. You suspect that one or more memory modules might not be working. You've observed that four 2-GB memory modules for a total of 8 GB of memory (8,192 MB) are installed. However, when you boot the computer, the screen is blank, and the computer beeps several times.

In this lab, your task is to diagnose and correct the problem as follows:

• Identify which memory modules work and which are broken. Hint: The computer will not boot if any non-working modules are installed.


• Place the two non-working memory modules on the Shelf.


• Install the two working modules (DIMM5 and DIMM6) from the shelf to maximize memory usage using the recommended memory configurations for the motherboard.


• Boot the computer to Windows and use the System option in the Settings app to verify that all installed memory (8 GB) is detected.


When you select a memory module or place it on the Shelf, the name of the module identifies its original position in the computer when the lab first starts. You can use this name to help differentiate between memory modules.

Explanation

In this lab, your task is to diagnose and correct the problem as follows:

• Identify which memory modules work and which are broken. Hint: The computer will not boot if any non-working modules are installed.


• Place the two non-working memory modules on the Shelf.


• Install the two working modules (DIMM5 and DIMM6) from the shelf to maximize memory usage using the recommended memory configurations for the motherboard.

• Boot the computer to Windows and use the System option in the Settings app to verify that all installed memory (8 GB) is detected.


Complete this lab as follows:

1. Identify which memory modules are working as follows: a. Above the computer, select Motherboard to switch to the motherboard.


b. Remove all memory modules from the computer but one and place the modules on the Shelf.


c. Above the computer, select Front to switch to the front view of the computer.


d. On the computer, select the power button on the front of the computer.


e. When the BIOS loading window appears, press F2 to enter the BIOS. . If the BIOS recognizes the memory, the module is good.


. If the BIOS does not boot, the module is bad.


f. From the top navigation menu, select Bench to return to the hardware.


g. On the computer, select the power button to turn the computer off.


h. Above the computer, select Motherboard to switch to the motherboard.


i. Drag the memory module to the Shelf.


j. From the Shelf, drag an untested memory module to a slot on the motherboard.


k. Repeat steps 1c–1h to test all remaining modules.


2. Drag the four working memory modules from the Shelf to the correct color slots on the motherboards.


3. Boot to Windows and verify that all installed modules are recognized by the system as follows: a. Above the computer, select Front to switch to the front view of the computer.


b. On the computer, select the power button on the front of the computer.


c. When Windows boots, select Start , then Settings , then System .


d. On the left side of the window, scroll down and select About .


e. Under Device specifications , Installed RAM , note that 8 GB is stalled.

3.6.11 Troubleshoot Processor Installation (Demo Video) Transcript:

In this lab, we'll troubleshoot a computer that isn't starting. Since this computer's processor has recently been upgraded, that's a likely culprit. First, let's press the power button and see what happens. Nothing. OK, let's look at the motherboard.

We can view the motherboard specifications by selecting it and clicking Details, Specifications. The CPU socket is labeled as number 2, and the fan connectors are labeled as 3. This will help us find them in the system.

Before we mess around with the processor, we should make sure the fan is correctly installed. If there's a problem with the fan, the CPU will overheat and cause errors. If we click here, we can see that the fan is correctly installed and plugged in.

Next, let's try replacing the processor. Drag the fan to the side. We'll leave it plugged in; we just need it out of the way so we can get to the processor. Drag the old processor to the shelf, then drag the new processor into the CPU socket. Don't forget to replace the fan and heat sink. Processors get hot enough to boil water, and if the fan isn't in place it could damage the computer.

Let's try turning on the computer and see if it works. Looks like we're good! The problem was a faulty processor.

3.6.12 Troubleshoot Processor Installation (Simulation) Scenario

You work at a computer repair store. You just upgraded the processor in a customer's computer. The customer purchased the latest AMD Phenom II processor, and you installed it in the computer. There is another AMD Phenom II processor on the Shelf.

However, the computer will not start now.

In this lab, you task is to diagnose and correct the problem. Use the following steps to walk through the troubleshooting process:

1. Press the power button on the computer to verify that it will not start.


2. Select the motherboard and view the specifications to identify the location of the CPU socket and fan power connector.


3. Answer Question 1.


4. Close the motherboard specs and verify that the CPU heat sink and fan assembly is installed.


5. Answer Question 2.


6. Answer Question 3.


7. Based on your findings, you will need to replace the CPU. o Temporarily remove the heat sink and fan to the Workspace.


o Remove the bad CPU and place it on the shelf.


o Install the new AMD AM3 CPU from the shelf onto the motherboard.


o Re-install the heat sink and fan onto the CPU socket.


o Verify that the fan power connector is still connected to the motherboard.


8. Turn on the computer and verify that it boots into Windows.


If the CPU heat sink and fan assembly were simply not installed correctly, the computer would likely boot, but then it

would shut down within a short period of time. Explanation

In this lab, you task is to diagnose and correct the problem. Because you just replaced the processor, the problem is likely with the processor configuration or the processor itself.

Possible problems include:

• The heat sink and fan not being installed.


• The fan power connector not being connected to the motherboard.


• The CPU not supported by the BIOS.


• The CPU is bad.


For the first two problems, the computer would likely boot, but then it would shut down within a short period of time. For the last two problems, you need to replace the processor. If the processor is not supported by the BIOS, you might be able to perform a BIOS update to make it recognize the new processor. However, you would need to install a supported processor first, flash the BIOS, and then re-install the new processor. (Flashing the BIOS is not supported in this lab, so you will simply need to replace the processor.)

Complete this lab as follows:

1. Reproduce the problem as follows: a. Click the power button to start the computer.


b. Click OK to close the message inside the lab.


c. Above the computer, select Motherboard to switch to the motherboard view of the computer to diagnose the problem.


d. Select the motherboard .


e. Under Selected Component, identify the socket type of the motherboard.


f. In the Selected Component window, select Details .


g. Select the Specifications tab.


h. Read the motherboard documentation to identify additional requirements for the CPU.


i. Identify the location of the CPU fan connector.


j. Answer Question 1: Which label numbers identify the location of the CPU socket and fan power connector on the motherboard?


k. Close the Motherboard Details window.


2. Verify that all CPU power cables are connected as follows: a. Select the CPU heat sink and fan .


b. In the Selected Component window, verify that the fan power connector is connected to the motherboard.


c. Answer Question 2: Is a heat sink and fan assembly installed onto the CPU socket?


d. Answer Question 3: Is the fan power connector connected to the motherboard?

e. Because everything is connected properly, you will need to replace the CPU.


3. Drag the heat sink and fan to the Workspace.


4. On the Shelf, expand Processors .


5. Drag the CPU on the motherboard to the Shelf to remove it from the computer.


6. From the Shelf, drag the CPU, AMD AM3 to the CPU socket on the motherboard.


7. From the Workspace, drag the heat sink and fan to the motherboard.


8. In the Selected Component window, verify that the fan power connector is still connected to the motherboard.


9. Above the computer, select Front to switch to the front view of the computer.


10. Click the power button to verify that it boots into Windows.


3.6.13 Troubleshoot SATA Devices (Demo Video) Transcript:

In this lab, you need to diagnose and fix a problem with a hard drive.

First, we'll turn the computer on, then press F2 to enter the BIOS. Down here, we can see the computer is detecting one hard drive. This is a problem because there are two hard drives installed. Let's open up the computer and see if we can figure out what's going on.

This bottom drive is the one that's giving us problems. First, we'll make sure it's connected. A hard drive needs two connections – a data connection and a power connection. We'll check the data connection first. If we click this red SATA cable, we can see that it's attached to a SATA port on the motherboard. No problems here. Next, let's check the power connection. Looks like it's correctly attached to the power supply – no problems here, either.

We know the connections are in place, but we can't be certain the connections are working. Maybe there's a fault in one of the cables that we can't see just by looking. Let's start by testing the power supply to verify that it's outputting the right amount of electricity. Drag the power supply tester from the shelf to the workspace. Drag the 20+4 pin connecter to the tester, then drag the 15-pin power supply from the hard drive to the tester. All three indicator lights are green, which means the drive is receiving adequate power. The problem must be somewhere else. Let's reconnect both plugs, then return the tester to the shelf.

Next, let's check the SATA cable. A good way to test a cable is to use a known good spare. If we replace the cable and the computer starts working, we can be sure the old cable was the problem. Unplug the old cable and drag it back to the shelf, then attach the known good spare from the shelf. With the good spare in place, reboot the computer and press F2 to access the BIOS. Looks like we're still only detecting the top drive. Darn. We'll still leave the known good spare in place, though, because we can't be certain the old cable was working properly.

Since the power is good and the cable is good, it looks like we may have a faulty hard drive on our hands. Head back to the bench and open the computer by clicking Motherboard. Disconnect both cables, drag the old hard drive to the shelf, and drag the new hard drive into place. Then, replace both cables. Click the power supply, then drag in a 15-pin connector. Find the SATA cable from the motherboard with an unconnected end, then drag that end to the drive.

Let's turn the computer on again to see if the problem's been resolved. If we press F2 to go to the BIOS, the computer now recognizes both drives. Looks like the problem was a faulty hard drive. If we want to be extra sure that the problem has been resolved, we can load Windows. Right-click Start, then click Disk Management. From here, we can see that Windows recognizes both hard drives.

3.6.14 Troubleshoot SATA Devices (Simulation) Scenario

You work at a computer repair store. A customer is having trouble with their hard drives. The computer recognizes the

top hard drive, which contains operating system files. But it is not recognizing the bottom drive.

In this lab, your task is to diagnose and correct the problem. Use the following steps to walk through the troubleshooting process:

1. Press the power button on the computer, then press Delete to enter the BIOS.


2. Notice how many SATA drives are being detected.


3. Answer Question 1.


4. Turn off the computer and switch to the motherboard view.


5. Verify that the red data cable is properly connected from the bottom hard drive to the motherboard.


6. Answer Question 2.


7. Verify that power is properly connected from the power supply to the bottom hard drive.


8. Answer Question 3.


9. Use the Power Supply Tester on the shelf to verify that the bottom hard drive is receiving adequate power. Drag the tester to the Workspace. Drag the 20+4 pin power supply connector from the motherboard to the main tester port (far right). Then drag the 15-pin SATA power connector from the bottom hard drive to the SATA port on the tester (bottom left).


10. Answer Question 4.


11. Replace the red data cable on the bottom hard drive with a known good cable one the shelf.


12. Press the power button on the computer, then press Delete to enter the BIOS.


13. Answer Question 5.


14. Return to the Bench view and turn off the computer.


15. Disconnect the data and power cables and replace the bottom hard drive with the new drive on the shelf.


16. After reconnecting the cables, turn the computer back on and verify that both drives are detected in the BIOS.


17. Answer Question 6.


18. If you wish, exit the BIOS, wait for Windows to load, and then run Disk Management to verify that Windows recognizes both disks.


Explanation

Complete this lab as follows:

1. Verify the problem as follows: a. Click the power button on the computer to start the computer.


b. As the BIOS loads, press the Delete key.


c. Answer Question 1: How many drives are initially detected by the BIOS?


d. From the top navigation tabs, select Bench to switch to the Bench view to verify the hardware configuration of the

drives.


e. Click the power button to turn the computer off.


2. Troubleshoot the hard drives and cables as follows: a. Above the computer, select Motherboard to switch to the motherboard view for the computer.


b. Select the SATA cable connector on the bottom hard drive.


c. Under Selected Component, make sure the cable connector is correctly connected to the hard drive and the motherboard.


d. Answer Question 2: Is the data cable connected from the bottom hard drive to the motherboard?


e. Select a power connector on the bottom hard drive.


f. Under Selected Component, make sure the power connector is connected correctly to the hard drive.


g. Answer Question 3: Is power connected to the bottom hard drive?


h. On the Shelf, expand PC Tools .


i. Drag the Power Supply Tester from the Shelf to the Workspace area.


j. Above the computer, select Motherboard to switch to the motherboard view.


k. Drag the 20+4 pin power supply connector from the motherboard to the ATX Main port on Power Supply Tester.


l. Drag the 15-pin SATA power connector from the bottom hard drive to the SATA port on the Power Supply Tester.


m. Answer Question 4: What do the three Power Supply Tester lights indicate about power to the bottom hard drive?


n. Drag the 20+4 pin power supply connector from the Power Supply Tester back to the motherboard connector.


o. Drag the 15-pin SATA power connector from the Power Supply Tester back to the bottom hard drive connector.


3. Connect a known good SATA cable as follows: a. Drag the SATA connector from the bottom hard drive to the Workspace to disconnect it.


b. Drag the other end of the SATA connector from the motherboard to the Workspace.


c. On the Shelf, expand Cables .


d. Select the SATA cable.


e. Under Selected Component, drag a SATA connector to a SATA port on the motherboard.


f. Under Selected Component, drag the unconnected SATA connector to the connector on the hard drive.

g. Above the computer, select Front to switch to the front view for the computer.


h. Click the power button on the computer to start the it.


i. As the BIOS loads, press the Delete key.


j. Answer Question 5: After replacing the data cable on the bottom hard drive, how many drives are detected by the BIOS?


4. Replace the hard drive as follows: a. From the top navigation tabs, select Bench to switch to the Bench view.


b. Click the power button to turn the computer off.


c. Above the computer, select Motherboard to switch to the motherboard view.


d. Disconnect the SATA power cable from the hard drive.


e. Disconnect the SATA data cable from the hard drive.


f. Drag the hard drive to the Shelf.


g. Expand Hard Drives .


h. Drag the hard drive to the open 3.5 inch bay.


i. Under Partial Connections for the computer, drag the unconnected SATA cable to the connector on the hard drive.


j. Under Partial Connections for the computer, select the power supply .


k. Under Selected Component, drag the unconnected SATA power cable to the connector on the hard drive.


l. Above the computer, select Front to switch to the front view for the computer.


m. Click the power button on the computer to start the computer.


n. As the BIOS loads, press the Delete key.


o. Answer Question 6: After replacing the hard drive, how many drives are detected by the BIOS?


p. Click Exit to restart.


q. After Windows loads, right-click Start and select Disk Management .


r. Click OK .


s. Verify that Windows recognizes all the disks.

3.6.15 Section Quiz (Section Quiz) q_itf2_troubleshooting_01

Which of the following is often the hardest part of troubleshooting? Answers:

• Asking the user questions


• *Reproducing the problem


• Documenting findings


• Implementing a solution


Explanation:

Reproducing the problem is often the hardest part of troubleshooting. You might need to ask the user questions to identify exactly how the problem occurred, or you might need to watch them perform the task again in order to reproduce the problem.

Asking the user questions should not be a very difficult part of the troubleshooting process. Your findings should be detailed, but documenting them is not unusually difficult.

Implementing a solution relies on reproducing the problem first, so it is not the hardest part of troubleshooting. q_itf2_troubleshooting_02

Which of the following problems would be the MOST difficult to troubleshoot? Answers:

• Software error


• *Intermittent problem


• Overheating


• Hardware error


Explanation:

Intermittent problems are often the most difficult to troubleshoot as they can be very difficult to reproduce. In these situations, checking for environmental conditions such as kinked cables or overheated components can help.

Software errors are usually not the most difficult troubleshooting task. If the software is giving an error code, the manufacturer's website can often give additional assistance.

Overheating is not the most difficult issue to troubleshoot.

A hardware error is not the most difficult troubleshooting task. If you have problems identifying a hardware error, you can simplify the system by removing all but the necessary components (processor, memory, and hard disk). Add devices one at a time and restart the system. If an error occurs, remove the newly added device and proceed to troubleshoot it. q_itf2_troubleshooting_common

Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem?

Answers:

• *Check for obvious or common issues.


• Divide and conquer to find a possible cause.


• Check with others to see if they can duplicate the problem.


• Test your theories to verify the cause of the problem.

Explanation:

When trying to identify the possible causes of a problem, you should start by checking for simple, obvious, and common issues. For example, check power cords, connectors, and common user errors.

While dividing and conquering is an important approach to identifying the possible causes of a problem, you should first check for any obvious or common issues.

Checking with others to see if they can duplicate the problem is helpful, you should first check for any obvious or common issues.

Testing your theories to verify the cause of the problem is the next step after identifying possible causes. q_itf2_troubleshooting_divide

A system administrator has a problem with a network server dropping its connection to the network on a regular basis. The administrator decides to list all the probable causes for the issue and then test each one individually to try and isolate what is causing the issue.

Which of the follow BEST describes this troubleshooting technique? Answers:

• *Divide and conquer.


• Identify the problem.


• Create an action plan.


• Document the process.


Explanation:

Dividing and conquering is a troubleshooting technique that helps you isolate what is actually causing a problem by individually testing each potential issue.

Identifying the problem is the first step in the troubleshooting process. However, in this scenario, the system administrator has already identified the problem and now needs to find the cause.

Creating an action plan comes later in the troubleshooting process. It comes after the administrator has tried to find a probable cause.

Documenting the process is the last step in the troubleshooting process. It does not focus on finding a probable cause. q_itf2_troubleshooting_escalate

A system administrator has been troubleshooting a problem with a database server not providing the information necessary to generate reports from a customer application. The administrator has tried testing several theories, but nothing seems to resolve the issue.

Which of the following describes the MOST effective action the administrator should take next to try to resolve the problem?

Answers:

• *Escalate the problem to the database engineer.


• Consult with other system administrators in the company.


• Keep a record of the testing attempts to include in the action plan.


• Research the company knowledge base and the internet.


Explanation:

If you cannot identify the cause of a problem, or if it is beyond your ability to fix, it is recommended that you escalate the problem to someone more capable of handling it.

If you cannot identify the cause of a problem, you might want to consult with other system administrators. But the most effective action would be to escalate the problem to the database engineer (who is more capable of handling it).

While keeping a record of testing attempts can be useful in documenting the troubleshooting process, the most effective action would be to escalate the problem to the database engineer (who is more capable of handling it).

Researching the company knowledge base and the internet could provide some information that would be helpful, but the most effective action would be to escalate the problem to the database engineer (who is more capable of handling it). q_itf2_troubleshooting_methods

When you are identifying possible causes of a problem, which of the following are troubleshooting methods you should try? (Select two.)

Answers:

• Research knowledge bases and the internet.


• *Check for simple, obvious, and common problems.


• Test any theories you might have.


• *Consider using multiple approaches.


• Escalate the problem.


Explanation:

When identifying possible causes of a problem, the first thing to do is check for simple, obvious, and common issues. When identifying possible causes of a problem, you might want to consider multiple approaches, such as stepping through the process or using a workaround temporarily until the problem can be solved.

Researching knowledge bases and the internet for information is a step in the troubleshooting process, but this should be done before identifying the possible causes of a problem.

Testing your theories is a step in the troubleshooting process, but this should be done after you identify any possible causes of a problem.

Escalating a problem is part of testing your theories, which is a troubleshooting step that comes after you identify any possible causes of a problem.

q_itf2_troubleshooting_plan

As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system.

What should your plan of action include? Answers:

• Identifying possible causes of the problem


• Escalating the problem


• *Detailing steps and the resources needed to implement the solution


• Addressing multiple problems individually


Explanation:

Your plan of action in this scenario should include detailed steps and the resources needed to implement the solution. Identifying possible causes of the problem is a step that should be completed before creating your action plan.

Escalating the problem can happen before or after creating your plan of action, but it is not part of the plan. Addressing multiple problems individually is part of the establishing a theory of probably cause step. q_itf2_troubleshooting_prevent

A system administrator has completed the entire troubleshooting process. Some employees at the office were plugging their Ethernet cable into the wrong port and not getting access to network resources.

Although the administrator tested the solution, a couple weeks later other employees begin help tickets for the same issue.

Which of the following BEST describe what the administrator might have missed doing during the troubleshooting process?

Answers:

• Documenting the solution and process.


• *Taking preventative actions.


• Ensuring that the solution did not cause any new problems.


• Escalating the problem.


Explanation:

Besides simply testing the solution, the administrator should have taken any action to prevent the problem from happening again. In this case, labelling the correct network jack connection might have prevented other employees from having the same problem.

Documenting the solution and process would have provided the administrator with a record of what the problem was and what was done to solve it. But it probably would not have prevented the problem from recurring.

While part of testing the solution is ensuring that the problem is fully resolved and that implementation did not cause any new problems, there is no new problem associated with this scenario. It is the same problem being reported by other employees.

If you cannot identify the issue causing a problem, you should escalate the issue to someone more capable of handling it. However, in this case, the problem was quickly identified and did not need escalation.

q_itf2_troubleshooting_research

Greg is a network administrator for a medical supply company and has identified a problem with an access control list (ACL) failing to filter out data packets that have been restricted.

What is the next step Greg should take to troubleshoot the ACL problem? Answers:

• Identify a theory of probable cause.


• Create an action plan.


• *Research knowledge bases and the internet for information related to the problem.


• Back up the ACL and related systems.


Explanation:

After identifying the problem, Greg should check knowledge base articles, network topology diagrams, the internet, and any other documents that may provide helpful information.

Identifying a theory of probable cause is something that Greg can do as part of the troubleshooting process, but this is only after researching the problem in sources such as knowledge bases and the internet.

Creating an action plan is something that Greg should do as part of the troubleshooting process, but this is only after completing steps such as researching, backing up systems, identifying possible causes, and testing any theories.

Before identifying possible causes, testing theories, and creating an action plan, Greg may want to back up the ACL and any related systems, but this is only after researching the problem in sources such as knowledge bases and the internet. q_itf2_troubleshooting_separate

A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users.

Which of the following is the BEST approach to solving these problems? Answers:

• Try to find the relationship between the problems.


• Back up the system hosting the financial application.


• *Approach each problem separately.

• Create an action plan for each problem.


Explanation:

If multiple problems exist, tackle each one separately.

Trying to find the relationship between problems might help an administrator to discover a common issue, but it can also involve significant wasted time.

Backing up a system is a step in the troubleshooting process that an administrator should do before making changes to the system. However, this does not help to solve the issues.

Creating an action plan is a step in the troubleshooting process that addresses the most likely causes of a problem. However, it is not an overall strategy for solving a problem (even if you create an action plan for each problem). q_itf2_troubleshooting_step1

Identifying the problem is the first step in CompTIA's troubleshooting model. Which of the following are tasks associated with this step? (Select three.)

Answers:

• *Duplicate the problem


• Question the obvious


• Escalate as necessary


• *Identify symptoms


• Consider multiple approaches


• *Question users


Explanation:

To identify the problem, you need to perform tasks such as:

• Duplicating the problem (if possible)


• Identifying the symptoms of the problem


• Questioning users about the issue


Questioning the obvious is a task associated with "Step 3 - Establish a theory of probably cause." Escalating as necessary is part of "Step 6 - Implement the solution or escalate as necessary."

Considering multiple approaches is a task also associated with "Step 3 - Establish a theory of probably cause." q_itf2_troubleshooting_theory

A network administrator is following the troubleshooting process to try and resolve a third-party application problem. After researching the issue and backing up the system, what is the next step in the troubleshooting process for the administrator?

Answers:

• Test any theories.


• *Establish a theory of probably cause.


• Create an action plan.


• Document the solution and process.

Explanation:

After researching knowledge bases, the internet and any other documents that may provide helpful information, and then backing up the system where the application resides, the next step for the administrator is to establish a theory of probably cause.

Testing any theories can verify the cause of a problem, but it is not next after researching the issue and backing up the system.

Creating an action plan addresses the most likely problems, but it is not the next step after researching the issue and backing up the system.

Documenting the solution and process is the final step in the troubleshooting process. It is not the next step after researching the issue and backing up the system.

q_itf_troubleshooting_facts_01

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.) Answers:

• *Make sure the power cord is plugged into the wall.


• Open the computer and replace the power supply.


• Make sure the keyboard and mouse are plugged in.


• *Make sure the surge protector is turned on.


• Use a multimeter to test the power supply.


Explanation:

When troubleshooting the power supply, always check the following before opening up the computer:

• Make sure the power cord is plugged into the wall.


• Verify any surge protectors are plugged in and in the on position.


• Make sure the power supply's switch is in the on position.


Only after you identify the power supply is the problem should you replace it. The keyboard and mouse being unplugged will not prevent the computer from powering on. Testing the power supply using a multimeter should be done only after the obvious has been ruled out.

q_itf_troubleshooting_facts_02

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?

Answers:

• *Establish a theory of probable cause


• Identify the problem


• Test the theory to determine the cause


• Establish a plan of action to solve the problem


Explanation:

The next step in the troubleshooting methodology is to establish a theory of probable cause. Here is the troubleshooting methodology in order:

1. Identify the problem


2. Research knowledge base/Internet, if applicable


3. Establish a theory of probable cause


4. Test the theory to determine the cause


5. Establish a plan of action to solve the problem and identify potential effects


6. Implement the solution or escalate as necessary


7. Verify full system functionality and, if applicable, implement preventive measures


8. Document findings/lessons learned, actions, and outcomes


q_itf_troubleshooting_facts_03

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

Answers:

• *Establish a plan of action to solve the problem and identify potential effects


• Implement the solution or escalate as necessary


• Verify full system functionality and, if applicable, implement preventive measures


• Document findings/lessons learned, actions, and outcomes


Explanation:

The next step in the troubleshooting methodology is to establish a plan of action to solve the problem and identify potential effects.

Here is the troubleshooting methodology in order:

1. Identify the problem


2. Research knowledge base/Internet, if applicable


3. Establish a theory of probable cause


4. Test the theory to determine the cause


5. Establish a plan of action to solve the problem and identify potential effects


6. Implement the solution or escalate as necessary


7. Verify full system functionality and, if applicable, implement preventive measures


8. Document findings/lessons learned, actions, and outcomes


q_itf_troubleshooting_facts_04

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

Answers:

• *Document findings/lessons learned, actions, and outcomes


• Establish a plan of action to solve the problem and identify potential effects


• Implement the solution or escalate as necessary


• Verify full system functionality and, if applicable, implement preventive measures


Explanation:

The last step in the troubleshooting methodology is to document findings/lessons learned, actions, and outcomes. Here is the troubleshooting methodology in order:

1. Identify the problem


2. Research knowledge base/Internet, if applicable


3. Establish a theory of probable cause


4. Test the theory to determine the cause


5. Establish a plan of action to solve the problem and identify potential effects


6. Implement the solution or escalate as necessary


7. Verify full system functionality and, if applicable, implement preventive measures


8. Document findings/lessons learned, actions, and outcomes


q_itf_troubleshooting_facts_05

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

Answers:

• *Duplicate the problem, if possible


• Establish a theory of probable cause


• Establish a plan of action


• Identify symptoms


Explanation:

Here are the steps for identifying the problem:

• Gather information


• Duplicate the problem, if possible


• Question users


• Identify symptoms


• Determine if anything has changed

• Approach multiple problems individually


q_itf2_motherboardtrouble_01

Which of the following is a top cause of motherboard failure? Answers:

• Liquid damage


• Corrupted BIOS


• *Physical damage


• Incompatible chipset driver


Explanation:

Physical damage is one of the top causes of motherboard failure.

Liquid will damage a motherboard, but it is not one of the top causes of motherboard failure. A corrupted BIOS is not a top cause of motherboard failure.

An incompatible chipset driver is not a top cause of motherboard failure. q_itf2_processortrouble_01

A computer has power, but there are no beeps and the computer does not boot. Which of the following would be the MOST LIKELY cause?

Answers:

• No operating system installed


• Hard drive failure


• *CPU failure


• Outdated BIOS


Explanation:

A CPU failure would be the most likely cause for these symptoms. If the CPU is bad, the computer won't be able to POST (Power-On Self-Test). There will still be power but no beep codes or any other activity.

If there is no operating system installed, the computer will boot to an error screen. A hard drive failure would allow the computer to boot to an error screen.

A outdated BIOS would not cause a system to be unable to boot. q_itf2_processortrouble_post_01

When Jacob first starts his computer, he hears several warning beeps and nothing else happens. Which of the following is sending out the beeps?

Answers:

• Operating system (OS)


• *Power-On Self-Test (POST)


• Power source


• Heat sink


Explanation:

If your computer does have power, it'll run a Power-On Self-Test (POST) when booted. If your computer encounters an

issue before POST has completed, an audible beep code will occur before loading the operating system. The number and frequency of those beeps indicate a specific issue. The beeps are provided by the Power-On Self-Test (POST).

The operating system does not produce beeps when the computer is first started.

If you encounter a computer that won't turn on at all (no sounds, lights, or fans), it's important to check the power source. However, the power source does not produce beeps when the computer is first started.

The CPU contains a mass of tightly packed circuits that are normally topped with a heat sink and fan to disperse heat. The heat sink does not send out audible beeps.

q_itf2_processortrouble_post_02

Which of the following makes sure that all the computer system hardware is in working order before loading the operating system?

Answers:

• Unified Extensible Firmware Interface (UEFI)


• Basic Input/Output System (BIOS)


• *Power-On Self-Test (POST)


• Device drivers


Explanation:

If your computer does have power, it runs a Power-On Self-Test (POST) when booted. This test ensures that all the computer hardware is in working order before loading the operating system.

The UEFI is a graphical boot tool that is utilized to configure the BIOS for the end user. It does not focus on making sure that all computer system hardware is in working order during the boot process.

BIOS is a simple program that is written directly into the motherboard's hardware and used to initiate hardware in the booting process. However, it does not make sure the hardware is in working order.

A device driver is software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras. However, it does not make sure the hardware is in working order during the boot process.

q_itf2_processortrouble_thermal

Which of the following fills in the microscopic gaps between the CPU and heat sink to increase the cooling effectiveness?

Answers:

• Heat spreader


• Heat sink


• Heat sink fan


• *Thermal paste


Explanation:

In between the heat sink and/or fan is a substance known as thermal paste. This allows for the efficient transfer of the heat from the CPU to the heat sink or fan. Thermal paste is effective because it fills in the microscopic gaps between the CPU and the heat sink that, if not filled, would reduce the heat sink's effectiveness.

A heat spreader transfers energy as heat in the same way a heat sink does. But instead of using a bulky piece of metal, it uses plates or blocks of material that have high thermal conductivity, such as copper, aluminum, or diamond.

A heat sink, typically a piece of metal with many fins, is a passive heat exchanger that transfers the heat generated by the CPU. It requires good airflow to work well.

A fan is often attached to the heat sink, which helps pull heat from the CPU and out the back of the computer case. q_itf2_storagetrouble_01

Which of the following would be the MOST LIKELY cause for a computer to perform sluggishly?

Answers:

• CPU


• *Hard drive


• RAM


• Power supply


Explanation:

Issues with the hard drive would be the most likely cause for a computer to run sluggishly.

CPU issues can cause a computer to run slower, but this would generally result in crashes or other system issues

RAM issues can cause a variety of problems from crashes and stalls all the way to making your computer unable to boot The power supply would not cause the computer to perform sluggishly.

3.7 Computer Hardware Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of computer hardware professionals affect my daily life?


• How can I prepare for a career in computer hardware?


This section describes common careers in computer hardware. After finishing this section, you should be able to:

• Describe common careers in computer hardware, ranging from PC repair technician to electrical engineer.


• Identify skills and educational requirements for computer hardware careers.


Key terms for this section include the following:

Term Definition


PC Repair Technician

A technician who repairs both software and hardware issues including but not limited to installing, troubleshooting, servicing, and repairing devices, as well as network equipment such as routers, switches, cables, and related network hardware.


Electrical Engineer

An industry professional who oversees the design and development of computer devices and other systems that use electricity and electronics.


3.7.1 Computer Hardware Careers (Lesson Video) Transcript:

When a computer system is running well, we often don't even notice the underlying hardware. As long as software applications are working and people can access the information they need, everyone's happy. But when a system stops working, important work often comes to a screeching halt. Sometimes we just need to reinstall or update software.

Sometimes it's networking hardware that needs to be diagnosed and fixed. And sometimes it's a hardware component within the computer itself. In this video, we'll discuss two careers in the repair and design of computer hardware.

A PC repair technician does exactly what the name implies: they repair PCs. This includes both software and hardware issues. A typical day for a PC Repair Technician involves installing, troubleshooting, servicing, and repairing devices

such as desktop computers, laptops, tablets, printers, as well as network equipment such as routers, switches, cables and related network hardware. Great customer service is essential in this job because it includes constant interaction with people who encounter computer problems. Being able to handle these situations calmly and professionally is what the job is all about. In addition to confidence in troubleshooting computer systems, an important skill for this job is the ability to train others. Repair technicians often need to instruct users on how use their personal computers and networks. To be qualified for a job like this, many employers ask for at least an industry certification.

While a PC Repair technician is an entry-level position that requires basic expertise in maintaining computer systems, electrical engineers require extensive education and advanced technical knowledge. They oversee the design and development of computer devices and other systems that use electricity and electronics. Electrical engineers design tiny microchips as well as large and complex computer systems. Their duties include researching, designing, creating, and maintain these systems. As an electrical engineer, you would become proficient in using computer aided design or CAD software. You would also need to be comfortable collaborating with other engineers to create sophisticated computer devices and systems. Educational requirements for this type of job include a minimum of a Bachelor of Science degree in Electrical and Computer Engineering, Computer Science, Physics, or Mathematics and frequently a master's degree in one of these fields.

In this video, we looked at two careers in the computer hardware field: PC repair technician and electrical engineer.

3.7.2 Computer Hardware Career Facts

IT professionals in a variety of different fields work extensively with both computer software and hardware. This lesson looks at two common IT careers that deal more extensively with computer hardware than others. A career as a PC repair technician is often considered an entry-level IT job, while electrical engineering requires much more education and advanced technical skill.

Table 1: Computer Hardware Careers Job Title

Description


PC Repair Technician

A PC repair technician does exactly what the name implies: they repair PCs. This includes both software and hardware issues. A typical day for a PC Repair Technician involves installing, troubleshooting, servicing, and repairing devices such as desktop computers, laptops, tablets, printers, as well as network equipment such as routers, switches, cables and related network hardware. Great customer service is essential in this job because it includes constant interaction with people who encounter computer problems. Being able to handle these situations calmly and professionally is what the job is all about. In addition to confidence in troubleshooting computer systems, an important skill for this job is the ability to train others. Repair technicians often need to instruct users on how use their personal computers and networks. To be qualified for a job like this, many employers ask for at least an industry certification.


Electrical Engineer

Electrical engineers require extensive education and advanced technical knowledge. They oversee the design and development of computer devices and other systems that use electricity and electronics. Electrical engineers design tiny microchips as well as large and complex computer systems. Their duties include researching, designing, creating, and maintain these systems. As an electrical engineer, you would become proficient in using computer aided design or CAD software. You would also need to be comfortable collaborating with other engineers to create sophisticated computer devices and systems. Educational requirements for this type of job include a minimum of a Bachelor of Science degree in Electrical and Computer Engineering, Computer Science, Physics, or Mathematics, and frequently a master's degree in one of these fields.


3.7.3 Interview: PC Repair Technician (Lesson Video) Transcript:

I took IT classes back when I was 18, and then after a long marriage and then a divorce I needed to get another job.

As a service desk technician, the number one job is to keep everybody up and running, but number two is to make them happy that you're there and to feel comfortable asking for your help. My favorite thing about working in the service desk is helping people. You kinda get this hero complex and I've had a lot of people talk about being a superhero – you're a

superhero when you're in service desk. And people that really thrive in the service desk have that kind of a mentality - they enjoy helping people.

Having the ability to troubleshoot through a problem. You have to be able to see outside of the box. That's one of the coolest "aha!" moments I see as a teacher and when I trained people as a service desk manager is when they get that "aha!" moment realizing the box does not exist, that there are always more solutions to the problem.

The normal tasks every day would have been fixing people's emails, resetting passwords, installing software, fixing software, installing hardware, fixing hardware. You know, who has the gushing chest wound, and who has a paper cut? And the person with the paper cut may scream louder, but the person, you know, with the gaping chest wound is the one that you need to take care of first. In the real world in IT that looks like somebody unable to do their job.

At each of the companies that I've worked for, there was usually a backlog of issues that had never been resolved. And that's the other part I love about IT is figuring out how to solve problems.

To intentionally move into IT you really do need some pretty solid experience, whether it's an A+ course, the PC Pro course, a mentor, a friend, an internship, you need experience. Very rarely can you just get a job as a service desk technician.

If you've built a computer, it counts. If you've installed software and you've done troubleshooting, it counts. Same thing with hardware - anything IT counts. Something that expresses that love of IT, expresses that you're the resident IT guy at work, or that you're the family IT go-to, those type of things can get you that interview.

The service desk is the face of IT. You represent the entire IT department. You can make and break the entire IT department. One of the things that I tried to teach my technicians as a service desk manager was how to be empathetic. When you have a user who's really upset that their computer doesn't work and they're getting more and more angry, your comment that "I'll get it fixed" or "I'm working on it" sometimes isn't enough, and remembering how it would feel if it was your computer, how it would feel if you were the one who couldn't do anything while you're waiting for them. If you can put yourself in their shoes, your responses naturally tend to be better, they tend to be more empathetic. Anybody can be a good service desk technician if they know how to treat people nicely. What really counts is the desire to learn it. I had a friend reach out to me. He said, "I've seen what you do at your current job, I've seen the way that you work with people, I've seen the way the service desk has thrived. We're looking for a teacher." And so I applied for the job. I expressed, you know, all my experience throughout all the years, and then I was hired.

Basically the part that I love most as a service desk manager role, the teaching and training people to become good service desk technicians, that's what I do all day every day. That's, um, I love it!

3.7.4 Section Quiz (Section Quiz)

4.0 Computer Software

4.1 Chapter Introduction


A young man using computer software like video conference calls, word processing, instant messaging, and others. Illustration.

Computer Software

This chapter discusses the purpose and features of computer software. Students learn the difference between system and application software, how computer software interacts with hardware, and how to troubleshoot common software problems. Simulated labs give students practice configuring operating systems, viewing BIOS settings, managing files, and using Microsoft Office applications. The chapter concludes with a brief look at common careers in system support. After finishing this chapter, you should be able to:

• Identify and describe the basic functions of computer operating systems.


• Explain the purpose of other types of system software, such as the BIOS, device drivers, and utility software.


• Perform file management tasks on both Windows and Linux.


• Configure, use, and troubleshoot application software.


• Configure software applications to send files to a printer.


• Identify common careers in system support.

4.2 Operating Systems Section Introduction

As you study this section, keep the following questions in mind:

• How does the operating system coordinate the work of hardware and software?


• How are mobile and desktop operating systems similar? How are they different?


This section introduces you to operating systems and gives you practice using both the Windows and iOS interfaces. After finishing this section, you should be able to:

• Identify common operating systems, including systems designed for mobile devices.


• Describe the basic functions of different types of operating systems.


• Identify and describe components of the Windows 10 operating system.


• Change display settings in Windows.


• Use the Settings app to view system information.


• Configure a screen saver through the Settings app.


• Describe the purpose of the configuration settings stored in the Windows registry.


• Use iOS on a mobile device to check email account settings, Wi-Fi settings, Bluetooth settings, and the iOS version.


Key terms for this section include the following:

Term Definition


Operating System

A computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.


Graphical User Interface

An operating system interface that allows a user to interact with the computer by displaying pictures, icons, and other images on a screen to represent files, folders, and system controls and by accepting input from a mouse or a touch screen.


Command Line Interface

An operating system interface that allows a user to interact with the computer by displaying text on a screen and accepting input from the keyboard. The input is entered as commands. The command line is used primarily by IT and other tech professionals.


Disk Management

A role of the operating system that helps keep storage devices well organized and maintained.


Application Management

A role of the operating system that manages applications or programs that are installed on a system. Applications are run, configured, and deleted through application management.


Service Management

A role of the operating system that runs processes or programs automatically in the background. These programs are

services that perform functions like indexing files for better searches, verifying that software is up to date, and backing up files.


Device Management

A role of the operating system that determines the hardware that is connected to the system, interprets instructions from the hardware, and sends instructions to it. Device management includes managing device drivers.


Access Control/Protection

A role of the operating system that requires users to log in with their credentials before accessing sensitive information on the computer. It also manages antivirus and antimalware software to prevent malicious files from accessing the computer.


Windows Settings App

In Windows 10, an application that organizes the settings and customizes how the computer looks and functions.


Windows Update

A feature of the Windows operating system that keeps the system up to date.


Windows Registry

A database that stores settings for the operating system and other programs. These settings are stored as keys and values.


Registry Editor

A utility of the Windows operating system which lets you view and change all the keys in the registry, giving users greater control over their computers.


4.2.1 Introduction to Operating Systems (Lesson Video) Transcript:

For a computer system to function, three very different things need to work together – hardware, application software, and a human being. Because these three are so different, it's impossible for them to communicate with each other directly. That's why computers use operating systems. An operating system, or OS, is a computer program that makes it so people, hardware, and software can interface with each other in a meaningful way. In this video, we'll learn about some of the operating system's most important functions.

One of the main functions of an operating system is to provide an interface between the computer and the user. Most modern operating systems use a graphical user interface, where files and software on the computer are represented by pictures and text, which make it easy for humans to understand and use.

Operating systems similarly provide an interface between the computer's hardware and application software. Hardware only speaks in raw physical signals, like pulses of electricity or light. Software understands things as ones and zeroes, which it can interpret as digital information. The operating system can take data from the hardware and pass it on to the software in a way it can understand, then take instructions from the software to be executed by the hardware.

It's important for storage hardware to be well organized. If information is scattered around a disk in a haphazard way, it takes a long time for the computer to get the information it needs, and the system slows down. Operating systems have disk management software, which helps keep storage devices well organized and maintained.

Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions, or processes, at the same time. The Operating System makes sure that each process is sent to the CPU in an orderly way. Sometimes, a process will malfunction. For example, there may be a memory leak, where a badly-written program uses up space in RAM but doesn't let it go when it's done with it. If this happens, the operating system can kill the process so it doesn't clog up the computer's resources.

Operating systems manage applications installed on a system. The OS has tools to view, configure, and delete applications.

The OS also runs services, which are processes that run automatically in the background. Services do things like

indexing files for better searches, verifying that software is up to date and backing up files.

Another of the operating system's jobs is to know what hardware is connected to the system, interpret instructions from the hardware, and send instructions to it. Sometimes, you'll install a piece of hardware, like a printer, that your operating system doesn't know how to talk to. To make the printer work, you need to install a driver. Drivers are like interpreters that help the hardware and the OS to speak the same language.

The next operating system role is security. Operating systems require users to log in with their credentials before accessing sensitive information on the computer. They also use antivirus and antimalware software to prevent malicious files from accessing the computer.

Finally, let's take a brief look at a few different operating systems you may encounter. The two most common operating systems for mobile devices are Android and iOS. Workstations, like desktops and laptops, generally use either Windows, MacOS, or Linux. Servers also generally have one of these OS types. Many devices, such as gaming consoles, televisions, and smart cars, have embedded operating systems called firmware. These devices need a simple, reliable OS that runs in a relatively static environment. Finally, a special type of software called a hypervisor can be used to run multiple operating systems on the same hardware in a process called virtualization.

In this video, we took a first look at operating systems. They provide an interface between the user and the computer, and between applications and hardware. They manage disks, processes, memory, applications, services, and devices. They also control access to the system and protect it from harm. We ended the video by talking about different types of operating systems.

4.2.2 OS Interfaces (Lesson Video) Transcript:

In this video, we're going to talk about two ways people can interact with their operating system – graphical user interfaces and the command line interface.

Even if you don't know it, you've already used a graphical user interface, or GUI - yes, that's really how you say it. GUIs use pictures, icons, and other images to represent files, folders, and system controls. People interact with these graphics using a mouse, touchscreen, or keyboard. For example, if I double-click this folder, a window opens and shows me the files inside.

The other way to interact with the operating system is using the command line interface. The command line is used primarily by IT and other tech professionals. Instead of using a mouse or touchscreen, the command line accepts input from the keyboard. Here, I'll type a command to open the same folder as before, then type another command to show the files inside.

Generally speaking, GUIs are better for consumers. They're easier to learn and have safeguards against accidentally ruining the system by deleting or modifying important files. The command line has a steeper learning curve, and it's possible to accidentally break the system if you don't know what you're doing. However, it also gives the user greater control over the file and operating systems and is faster than using a GUI.

In this video, we learned about the two ways you can interact with your computer system – with a graphical user interface or with the command line.

4.2.3 Operating System Facts

For a computer system to function, three things need to work together: hardware, application software, and a human being. Because these three are so different, it's impossible for them to communicate with each other directly.

An operating system (OS) is a computer program that allows people, hardware, and software to interface with each other. Operating systems are software that can communicate with a computer's hardware, provide a user interface to accept commands, allow applications to run, maintain a filing system, and have built in security features.

Operating system vary by device as follows:

• The two most common operating systems for mobile devices are Android and iOS.


• Workstations (desktops, laptops, servers, etc.) generally use either Windows, MacOS, or Linux.


• Many devices, such as gaming consoles, televisions, and smart cars, have embedded operating systems called firmware. These devices need a simple, reliable OS that runs in a relatively static environment.


• A special type of software called a hypervisor can be used to run multiple operating systems on the same hardware in a process called virtualization.

This lesson covers the following topics:

• OS functions and descriptions


• Operating system types


OS Functions and Descriptions

This lesson covers some of the operating system's most important functions and the different types of common operating systems.

Table 1: OS Functions and Descriptions Function

Description


Graphical user interfaces

One of the main functions of an operating system is to provide an interface between the computer and the user. Most modern operating systems use a graphical user interface (GUI), where pictures, icons, and other images are used to represent files, folders, and system controls. The GUI makes it easy for humans to understand and use. People interact with these graphics using a mouse, touchscreen, or keyboard. Typically, GUIs are better for consumers. They're easier to learn and have safeguards against accidentally ruining the system by deleting or modifying important files.


Command line interface

Another way users interact with the operating system is using the command line interface. The command line is used primarily by IT and other tech professionals. The command line accepts input from the keyboard, instead of a mouse or touchscreen. The command line has a steeper learning curve, and it's possible to accidentally break the system if you don't know what you're doing. However, it also gives the user greater control over the file and operating systems. It is faster than using a GUI.


Interface between applications and hardware

Operating systems provide an interface between the computer's hardware and application software. Hardware communicates in raw physical signals, like pulses of electricity or light. Software interprets ones and zeroes as digital information. The OS takes data from the hardware and passes it to the software in a way the software can understand. The operating system takes instructions from the software and passes it to the hardware be executed. Applications are computing software that are designed to perform a specific function such as word processing, web browsing, or media playing. When choosing application software, check the computer's CPU processing capability. Older computers use a 32-bit processing capacity. Newer computers typically have a 64-bit processing capacity. Some newer computers are designed to operate either 32-bit or 64-bit modes.

If you have software designed for a 32-bit mode operating system and your computer's CPU runs only in 64-bit mode, the OS will not be able to run the software.

Another thing to check when installing applications is the operating system the computer is using. The three most common ones are Microsoft Windows, MacOS, and Linux. Applications are designed to run on a specific operating system. An application calls functions from the OS that are needed to run the application.


Disk Management

It's important for storage hardware to be well organized. If information is scattered around a disk in a haphazard way, it takes a long time for the computer to get the


Function Description


information it needs and the system slows down. Operating systems have disk management software that helps keep

storage devices well organized and maintained.


File Management

The file management interface for Microsoft Windows is called File Explorer. Within this interface, you can create, delete, open, or rename files and folders. The files can be stored on a local disk or on other devices connected through a network server. When you select This PC within File Explorer, you have access to files and folders stored on the local hard drive; any removable devices or drives; and any connected network drives. To configure setting, right-click This PC and select either Properties or Manage. Properties gives you access to configuration within the System properties.

Manage accesses the Computer management console. When you select the Network option within File Explorer, you have access to any connected network servers. The Network container will show devices that are available to you within the network. These can be other computers, media devices, printers, or multifunction devices.


Process/memory management

Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions, or processes, at the same time. The OS makes sure that each process is sent to the CPU in an orderly way. Sometimes, a process will malfunction. For example, there may be a memory leak caused by a poorly-written program not releasing space in RAM when it's done with it. If this happens, the operating system can kill the process so it doesn't clog up computer resources. If your computer is unable to process all the programs you would like to run at the same time, you can either:

• Add more memory by physically installing memory banks to your motherboard.


• Open Task Manager (or a memory monitoring program on non-Windows operating systems) and stop any programs from running that you don't need or want.


This will allow the memory to be used for the programs you do want to run. Application management

Operating systems manage applications installed on a system. The OS has tools to view, configure, and delete applications.


Service management

The OS also runs services, which are processes that run automatically in the background. Services do things like indexing files for better searches, verifying that software is up to date, and backing up files.


Device management

Another of the operating system's jobs is to know the hardware that is connected to the system, interpret instructions from the hardware, and send instructions to it. You may install a piece of hardware (such as a printer) that your operating system doesn't know how to talk to. To make the printer work, you need to install a driver.


Function Description


Drivers are like interpreters that help the hardware and the OS to speak the same language. Access control/protection

An important operating system role is security. Operating systems require users to log in with credentials before accessing sensitive information on the computer. One of these most important principles in network security is the principle of least privilege. This means that a user is given access and permissions at the level that is required to do a job or tasks and nothing more. If the account is compromised, the hacker is limited to whatever that user's permissions and access are. Operating systems help you follow this privilege by providing two types of user accounts: administrative

and standard. The account that is created when initially installing an OS is an administrative account by default and cannot be changed. This is to give the person installing the OS all the rights and privileges to set up the computer. Best practices specify that an administrator create a standard user account to use for day-to-day tasks. The administrator account should be used only for the tasks that require that level of privilege. This limits risk if the system is hacked. All other users should be given only standard user accounts. If someone does need an administrator account, be sure to provide a standard user account for use for anything non-administrative. In addition to limiting privileges, operating systems also use antivirus and anti-malware software to prevent malicious files from accessing the computer. The Windows Enterprise editions allow administrators to configure privilege levels and rights through groups in the Local Users and Groups tab in the Computer Management console. This saves administrators time by:

• Grouping users that need the same privileges and rights to do their jobs.


• Controlling access by assigning the rights and privileges to the group and then adding the appropriate users to each group.


Operating System Types

The following table describes operating system types. Table 2: Operating System Types

OS TYPE

Description


Workstation

Operating systems (OS) that run on a laptop, desktop, or an all-in-one computer are typically referred to as workstation operating systems. Some examples include Microsoft Windows, Linux, and Apple OS X/macOS. In some cases, these workstation operating systems have various classifications, allowing them to be sold to a variety of customers. For example, Windows 10 offers Windows 10 Home, Windows 10 Pro, and Windows 10 Enterprise. Each provides a few more features and functions. Other operating systems provide similar offerings. In many cases a computer capable of running one workstation OS, such as Windows, can be changed to run a different OS, such as


OS TYPE

Description


Linux/Unix. Others, however, like macOS run on only proprietary hardware. For example, you cannot install macOS on a workstation that runs Windows 10.


Server

A server computer is designed to interface with multiple computer systems providing services these other computers need. Servers usually have more resources allocated to them, such as disk storage, read-only memory (RAM), and processing capabilities. In many cases, a server OS is based off the same basic code (also known as a kernel) as its workstation counterpart. However, server operating systems typically include additional software packages (sometimes known as roles) that provide the extra services needed by a network of computers and are therefore used more often in the business environments. To increase processing power, some server operating systems have the option to be run from a simple command-line interface instead of the traditional GUI seen with Windows workstation operating systems. Eliminating the GUI also adds an additional layer of protection.


Mobile device

Mobile device operating systems are used for hand-held devices, such as smartwatches, mobile phones, tablets, and

even smart speakers. These operating systems combine the features of a workstation operating system with other features useful for mobile or handheld use. While there are many different mobile device operating systems available, some of the most used include Android, Apple iOS, and KaiOS.


4.2.4 Windows Settings (Lesson Video) Transcript:

In Windows 10, the Settings App customizes how the computer looks and functions. The Settings App lets you make most configuration changes that used to be done in the Control Panel, if you're familiar with older versions of Windows. The Control Panel is still available in Windows 10, and a few settings still need to be changed through the Control Panel. But for the most part, you can use the Settings App. Let's take a look at how it works.

To launch the Settings App, click on the Start button and then click Settings. Within the Settings App are several options you can use to configure the system. We'll talk about a few of them here. If we click System, we'll see various options we can use to modify the screen display, view the computer's specifications, modify or uninstall applications, and configure other system preferences.

In the Scale and Layout section, we see options that let us change the way the display looks. For example, we can increase the size of text here. We can also select and apply a different screen resolution.

To see what kind of hardware and operating system is installed on your PC, click About from the left menu. Here, we can see the version of Windows installed, the type of processor in the system, the amount of memory installed, and the computer's name.

You can use Power & sleep options to regulate how much electricity the system uses. To reduce power consumption, you can shorten these default times. They determine how long your computer can be idle before turning off the screen or putting the PC into a low-power sleep mode. Now let's go back to the settings app home screen.

Devices manages peripheral devices such as printers, the mouse, and the keyboard.

Network and Internet manages your network settings when connecting the system to a network.

The Personalization option lets you change the way the display looks. For example, you can customize the current theme by selecting which desktop background, window color, and screen saver you want to use.

To change the screen saver, select Lock screen. Open the Screen Saver Settings window and select a screen saver from the drop down list. You can also specify how long the system must be idle before the screen saver automatically turns on. To apply the change, click OK.

The apps option lets you uninstall or modify apps, place restrictions on where you can install them from, and choose the default apps associated with specific file types.

Accounts lets you manage user accounts and set up parental controls. The Time & Language option lets you set the date, time, region, and language used by the system. Ease of Access lets you configure accessibility settings. Finally, Update & Security helps you to maintain the most up-to-date security and backup settings for your PC.

In this lesson, we learned about the Settings App on Windows. It can be used to reconfigure system settings, such as security, power plans, and display settings.

4.2.5 Windows Settings Facts

In Windows 10, the Settings App customizes how the computer looks and functions. The Settings App lets you make most configuration changes that used to be done in the Control Panel, if you're familiar with older versions of Windows. The Control Panel is still available in Windows 10 and a few settings still need to be changed through the Control Panel. But for the most part, you can use the Settings App. To launch the Settings App, click on the Start button and then click Settings. Within the Settings App are several options you can use to configure the system.

Image 1: Settings App


Settings App features. Screenshot. Table 1: Settings App Options OPTION

DESCRIPTION


System

In System, you will find various tools that allow you to modify the screen display, view the computer's specifications, modify or uninstall applications, and configure other system preferences.


Devices

In Devices, you manage peripheral devices, such as printers, the mouse, and the keyboard.


Network & Internet

In Network and Internet, you manage your network settings when connecting the system to a network. This includes configuring the Windows Firewall and changing network adapter options.


Personalization

The Personalization option lets you change the way the display looks on the monitor. For example, you can customize the current theme by selecting which desktop background, window color, and screen saver you want to use. You can also set up a new theme to be used by the display here.


Accounts

In User Accounts and Family Safety, you create and manage user accounts and set up parental controls.


Time & Language

In Time & Language, you set the date, time, region, and language used by the system.


Ease of Access

In Ease of Access, you configure accessibility settings for the system.


Privacy

Privacy gives you control over how your camera, microphone, and personal data are used by different apps.


Update & security

Windows Update lets you configure how and when updates from Microsoft are downloaded and installed on the system. In Update & security, you can also set backup and recovery options and configure settings for Windows Defender, which is anti-malware software installed by default on Windows systems.


On Windows 7 systems, the Backup and Restore feature (found in the Control Panel) was used to back up files and create system images. The primary Windows 10 backup feature is called File History . It is available from the Update & Security option in the Settings App.

4.2.6 The Windows Registry

The Windows Registry is a database that stores settings for the operating system and other programs. These settings are stored as keys and values. You can think of it like a filing cabinet - each file in the cabinet is a key, and the information written in the file is a value. Whenever you change a setting on your computer, such as changing the home page of your web browser or your PC's power settings, that change is stored as a key in the registry.

Registry Editor

Windows comes with a utility called Registry Editor, which lets you view and change all the keys in the registry. This gives users a huge amount of control over their computers. By making small changes to the registry, you can customize just about any aspect of your machine. That said, it's a bad idea to change a registry key unless you understand exactly what it does and how it will affect the system. The registry contains many essential keys that are necessary for the computer to function correctly, and changing them could cause the computer to malfunction.

4.2.7 Explore the Windows 10 OS (Demo Video) Transcript:

In this lab, you'll perform a variety of tasks in the Windows 10 environment. First, we'll configure the screen saver settings. Open the Settings app by clicking start, then the gear icon. Click Personalization. On the left pane, click Lock Screen. Scroll down, then click Screen saver settings. Set the screen saver to Photos and set the wait time to five minutes. Check the box to display the logon screen when the computer exits the screen saver, then click OK. Click

Home to go back to the main menu.

Next, we'll enable Remote Desktop. This will let authorized users access this computer remotely from a different computer. Click System, then on the left click Remote Desktop. Set the switch to on, then click Confirm. We're done with the settings app, so we can close it by clicking this X.

Now, we want to create a new folder. Open File explorer. Click This PC, then double-click the D drive. Right click into the white space, then select New > Folder. Type the name Reports, then press Enter.

Finally, we want to enable a network adapter. Right now, we can see that we don't have a network connection. Click the network icon, then click Network & Internet settings. Click Change adapter options. Right click the Ethernet adapter and select Enable. Now we have a network connection.

4.2.8 Explore the Windows 10 OS (Simulation) Scenario

In Windows, tools and programs can be accessed in a variety of ways. You need to complete a specific task in each area you visit. Be sure to complete every task for full credit on the lab.

In this lab, your task is to explore the features of the Windows 10 user interface as follows:

1. Configure the screen saver settings. a. Right-click Start and then select Settings .


b. Maximize the window for better viewing.


c. Select Personalization .


d. From the left pane, select Lock screen .


e. From the right pane, select Screen saver settings .


f. Under Screen Saver, use the drop-down to select Photos .


g. Configure the Wait time to 5 minutes.


h. Select On resume, display logon screen .


i. Select OK to close the Screen Saver Settings dialog.


j. In the top left, select Home to return to the Windows Settings page.


2. Enable Remote Desktop. a. From Windows Settings, select System .


b. From the left pane, select Remote Desktop .


c. From the right pane, under Enable Remote Desktop, slide the switch to ON .


d. Select Confirm .


3. Use File Explorer to create a folder. a. Right-click Start and then select File Explorer .


b. From the left pane, expand and select This PC > Data (D:) to open this drive.


c. From the right pane, right-click in white space, and then select New > Folder .

d. In the Name field, type Reports and then press Enter .


e. Close File Explorer.


4. Enable a network adapter. a. From Windows Settings, select Network & Internet .


b. From the right pane, under Change your network settings , select Change adapter options .


c. Right-click Ethernet and select Enable .


d. Close the Network Connections window.


e. In the top left, select Home to return to the Windows Settings page.


5. Select Score Lab .


Explanation

Complete this lab as follows:

1. Configure the screen saver settings. a. Right-click Start and then select Settings .


b. Maximize the window for better viewing.


c. Select Personalization .


d. From the left pane, select Lock screen .


e. From the right pane, select Screen saver settings .


f. Under Screen Saver, use the drop-down to select Photos .


g. Configure the Wait time to 5 minutes.


h. Select On resume, display logon screen .


i. Select OK to close the Screen Saver Settings dialog.


j. In the top left, select Home to return to the Windows Settings page.


You can also access screensaver settings by opening Control Panel . Then, in its search field, enter Screen . Under Power Options, select Change Screen Saver . This method has not been simulated.

2. Enable Remote Desktop. a. From Windows Settings, select System .

b. From the left pane, select Remote Desktop .


c. From the right pane, under Enable Remote Desktop, slide the switch to On .


d. Select Confirm .


e. In the top left, select Home to return to the Windows Settings page.


f. From File Explorer, right-click This PC and select Properties . From the left pane, select Remote settings .


g. From Control Panel, select Systems and Security . Under System , select Allow remote access .


a. Right-click Start and select File Explorer .


b. From the left pane, expand and select This PC > Data (D:) to open this drive.


c. From the right pane, right-click in white space and select New > Folder .


d. In the Name field, type Reports and then press Enter .


e. Close File Explorer.


Remote Desktop can also be enabled using either of the following methods:

3. Use File Explorer to create a folder.


You can also access File Explorer by selecting File Explorer from the Windows taskbar.

4. Enable a network adapter. a. From Windows Settings, select Network & Internet .


b. From the right pane, under Change your network settings , select Change adapter options .


c. Right-click Ethernet and select Enable .


d. Close the Network Connections window.


e. In the top left, select Home to return to the Windows Settings page. . From Control Panel , select Network and Internet > Network and Sharing Center > Change adapter setting .


. In the lower right corner of the Windows taskbar, select the Network icon and then select Network & Internet settings . From Control Panel , select Network and Internet > Network and Sharing Center > Change adapter setting .


The network adapter can also be enabled using either of the following methods:

5. Select Score Lab .

4.2.9 Change Windows Settings (Demo Video) Transcript:

In this scenario, you're configuring some monitor settings for your computer.

First, let's change the screen resolution. Right-click the desktop, then click Display Settings. Change the resolution to 1600x900, then click Keep Changes. When you're done, close this window.

Now, let's adjust the screen saver settings. Right-click the desktop, then click Personalize. On the left, click Lock Screen, then scroll down and click Screen Saver Settings. Change the screen saver to Ribbons. Change this number to 10, which will make the screen saver appear after ten minutes of inactivity. Check this box, which will require the user to log in before they can access the computer. When you're done, click OK.

4.2.10 Change Windows Settings (Simulation) Scenario

You recently purchased a new monitor for your desktop computer system. Your old monitor used a display resolution of 1280 x 1024. However, your new monitor uses a much higher display resolution. You need to change your display settings in Windows to match what is supported by the monitor.

To protect your new monitor, you want the screen saver to come on after the system has been idle for a brief period of time. In addition, you want to require the user to log in before the screen saver will deactivate.

Your task in this lab is to:

• Set the display resolution to 1600 x 900 .


• Set the screensaver to Ribbons .


• Configure the screensaver to activate after the system has been idle for 10 minutes.


• Require the user to log on before resuming.


Explanation

Use the Settings app to configure display and screen saver settings. Complete the following steps:

1. Click the Start button and then Settings .


2. Select the System option.


3. With the Display option selected, select 1600 x 900 from the Resolution drop-down list.


4. In response to the Keep these display settings? question, select Keep changes .


5. In the upper-left corner of the window, click the back arrow (<-).


6. Select the Personalization option.


7. In the left navigation pane, click Lock screen .


8. Click Screen saver settings near the bottom of the screen.


9. In the Screen Saver Settings window, from the Screen Saver drop-down list, select Ribbons .


10. In the Wait: field, enter 10 .


11. Select the On resume, display logon screen option.


12. Click OK .

13. Close the Settings app window.


4.2.11 Explore iOS (Demo Video) Transcript:

In this lab, you'll explore several iOS settings on an iPad. We'll use the mouse in the lab, but on a real iPad you'd use your finger. Most device settings can be found by opening the Settings app. At the top of the screen, we can see the name and email address of the device owner. At the left, we can see the device's Wi-Fi and Bluetooth status.

To view information about this specific device, click General, then About. This page shows our storage capacity, version number, model number, and other device-specific details.

If we scroll down this list, we can see other settings options. If we click Mail, we can adjust settings for our email application, including how many lines to show in a preview and how to organize messages.

We can also see our settings for Safari, the default web browser on iOS. On this page, we can set our default search engine, configure our favorites, and adjust security settings.

4.2.12 Explore iOS (Simulation) Scenario

The purpose of this lab is to help you become familiar with a few iOS settings on an iPad.

From the iPad home screen, select Settings . Then explore some of the options and answer the following questions:

• What is the email address of the owner of the iPad?


• What is the current status of Wi-Fi on the iPad?


• What is the current status of Bluetooth on the iPad?


• The General settings show which iOS version is running on the simulated iPad. What iOS version is installed?


• In Mail settings, how many lines of messages are set to be displayed in the Preview pane?


• In Safari settings, what is the default Search Engine?


Explanation

In this lab, you will explore several iOS settings on an iPad. You will then answer several questions:

• What is the email address of the owner of the iPad?


• What is the current status of Wi-Fi on the iPad?


• What is the current status of Bluetooth on the iPad?


• What iOS version is installed on the iPad?


• In Mail settings, how many lines of messages are set to be displayed in the Preview pane?


• In Safari settings, what is the default Search Engine?


Complete this lab as follows:

1. From the iPad home screen, select Settings .


2. In the upper-left corner, select the iPad owner's name (Tyrell Lewis).


3. In the Apple ID pane on the right, notice Tyrell's email address.

4. Answer Question 1.


5. In the Settings pane on the left, notice the status of Wi-Fi.


6. Answer Question 2.


7. In the Settings pane, notice the status of Bluetooth.


8. Answer Question 3.


9. In the Settings pane, select General .


10. In the General pane, select About .


11. In the About pane, notice the iPad Version number.


12. Answer Question 4.


13. Scroll down in the Settings pane and select Mail .


14. Near the top of the Mail pane, notice how many lines are set in the Preview option.


15. Answer Question 5.


16. Scroll down in the Settings pane and select Safari .


17. Near the top of the Safari pane, notice the default Search Engine.


18. Answer Question 6.


4.2.13 Section Quiz (Section Quiz) q_itf2_os_01

Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations?

Answers:

• Graphical user interface (GUI)


• *Command line interface (CLI)


• Application management


• Service management


Explanation:

The command line has a steeper learning curve, and it's possible to accidentally break the system if you don't know what you're doing. However, it gives the user greater control over the operating system and is faster than using a GUI. Generally speaking, GUIs are better for consumers. They're easier to learn and have safeguards against accidentally ruining the system by deleting or modifying important files.

An operating system (OS) manages applications installed on a system. The OS has tools to view, configure, and delete applications.

The Operating System also runs services, which are processes that run automatically in the background. Services do things like indexing files for better searches, verifying that software is up to date, and backing up files.

q_itf2_os_02

Which of the following does a computer use to make sure that people, hardware, and software can interface with each other?

Answers:

• GUI (graphical user interface)


• Device driver


• *OS (operating system)


• Application and hardware interface


Explanation:

For a computer system to function, three very different things need to work together: hardware, application software, and a human being. An operating system, or OS, is a computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.

Most modern operating systems use a graphical user interface (GUI), which makes it easy for humans to understand and use computers. But it does not interface between people, hardware, and software.

To make a device work, you need to install a driver. Drivers are like interpreters that help the hardware and the OS speak the same language. However, a driver does not provide an interface between people and a computer.

An application and hardware interface is provided by the operating system. The OS can take data from the hardware and pass it on to the software in a way it can understand. It then takes instructions from the software to be executed by the hardware. However, this only describes the interface between hardware and software.

q_itf2_os_03

What do you call the software that can communicate with a computer's hardware, provides a user interface to accept commands, maintains a filing system, and has built-in security features?

Answers:

• *Operating system


• Database


• Virus software


• Intrusion prevention system


Explanation:

To be considered an operating system, software must provide four main features: a way to communicate to hardware through drivers, a user interface so a user can issue commands (graphical or command line), a filing system, and system security features.

A database is used to store information.

Virus software is used to protect a system from malicious attacks.

An intrusion prevention system can be in the form of firewall software or a hardware device placed on your network. q_itf2_os_driver

Sam has installed a new hardware device to his computer. He tries to use his new device, but the device is not responding. What must Sam do next to get his new device to work?

Answers:

• Patch the OS


• *Install the software drivers


• Turn the device on in Device Manager

• Perform an application update


Explanation:

Sam needs to install the software drivers for his new hardware. Operating systems do come with pre-installed device drivers for particular devices, but because of the large variety of hardware, an operating system does not know how to talk to all devices.

An OS patch can include new device drivers, but that will not guarantee the device you are installing is included. A device may be included when you look at the list of connected devices on your computer, but until its driver is installed, the operating system will not know how to communicate with it.

The application software relies on the operating system to communicate with hardware. If the operating system can't communicate with a device, the application will not be able to either.

q_itf2_os_embedded

Frank has purchased a new smart TV. The new TV has the capability of streaming content over the internet. This is possible because Frank's new TV has which type of operating system?

Answers:

• Server OS


• Workstation OS


• Mobile OS


• *Embedded OS


Explanation:

An embedded operating system is one that has been designed for a specific device and cannot be changed.

A server OS is designed to provide network services to clients. These include web services, file services, DHCP services, DNS services, and many more.

A workstation operating system is placed on a desktop computer. Examples are Windows 10, a desktop version of Unbuntu Linux, or Apple's iOS. Desktop computers are not designed to have a specific OS installed, which means you can change them out if desired.

A mobile OS is designed for a specific phone manufacturer, such as Android OS for an Android phone or Apple iOS for an iPhone. They cannot be interchanged.

q_itf2_os_firmware

Pat has purchased a new piece of design software. After installing the software, she realizes that it's not performing as expected. After an internet search, she finds out that her video card's graphics microchip needs to be updated. What is the software embedded in a microchip called?

Answers:

• GUI


• *Firmware


• Ladder logic


• Software


Explanation:

Firmware is the software programed into a microchip. A good example of firmware is a computer's BIOS system. Through a firmware update, a device's program can be updated to include new instructions or tools.

GUI stands for graphical user interface. A GUI is used to send commands to a device using a mouse and icons.

Ladder logic is used in SATA control systems. It is a program that runs on industrial devices and runs from top to bottom in sequential order.

Software is what we call the applications we run on our computers. They are usually stored on our hard drives and called up when needed. Software makes calls to hardware.

q_itf2_os_mobile

Modern smartphones are amazing devices. They have more computing power than the computers that put a man on the moon in 1969. Which type of operating system do they run?

Answers:

• Server OS


• Workstation OS


• *Mobile OS


• Embedded OS


Explanation:

A mobile OS is designed for a specific phone manufacturer, such as Android OS for an Android phone or Apple's iOS for an iPhone. They cannot be interchanged.

A server OS is designed to provide network services to clients. These include web services, file services, DHCP services, DNS services, and many more.

A workstation operating system is placed on a desktop computer. Examples are Windows 10, a desktop version of Unbuntu Linux, or Apple's iOS. Desktop computers are not designed to have a specific OS installed, which means you can change them out if desired.

An embedded operating system is one that has been designed for a specific device and cannot be changed. q_itf2_os_privilege

The idea that users should only have computer permissions sufficient to perform their job role and no more is called what?

Answers:

• Elevated privileges


• Access control


• *Principle of least privilege


• Authorization


Explanation:

The principle of least privilege is the idea of only giving users enough permissions to do their job and no more. Giving a person more permissions than they need is considered a security risk.

Elevated privileges are part of UAC (user account control) in Windows. If a person is trying to accomplish something on a computer, but they don't have sufficient rights, an authorization dialog will appear asking for the administrator password.

Access control has many meanings. It could mean physical access to buildings or access to see or alter documents. Authorization is what a person can access on a network or computer. It's normally attached to the triple As: Authentication, Authorization, and Accounting.

q_itf2_os_process

While using Microsoft PowerPoint to create a company presentation, Jared notices that PowerPoint starts slowing down. Eventually none of the features become accessible and the program will not close. He decides to use Task Manager to stop the program from running.

Which operating system management role is Jared using? Answers:

• Service management


• Disk management


• *Process management


• Device management


Explanation:

Process management is a role of the operating system that manages the application code running in memory. Task Manager is process management tool that lets you shut down processes that are not responding in a computer's interface. Service management is a role of the operating system that runs processes or programs in the background and performs tasks such as indexing files and software update verification. Task Manager is not a service management tool.

Disk management is a role of the operating system that helps keep storage devices well organized and maintained. Task Manager is not a disk management tool.

Device management is a role of the operating system that performs tasks such as making sure that hardware is connected to the system and managing device drivers. Task Manager is not a device management tool.

q_itf2_os_server

Diane has been asked to install an operating system on a computer that's going to host a website and store community files for many users. Which type of operating system should Diane install on this computer?

Answers:

• *Server OS


• Workstation OS


• Mobile OS


• Embedded OS


Explanation:

A server OS is designed to provide network services to clients. These include web services, file services, DHCP services, DNS services, and many more.

A workstation operating system is placed on a desktop computer. Examples are Windows 10, a desktop version of Unbuntu Linux, or Apple's iOS. Desktop computers are not designed to have a specific OS installed, which means you can change them out if desired.

A mobile OS is designed for a specific phone manufacturer, such as Android OS for an Android phone or Apple iOS for an iPhone. They cannot be interchanged.

An embedded operating system is one that has been designed for a specific device and cannot be changed. q_itf2_os_task

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC?

Answers:

• *Task Manager


• Device Manager


• Disk Management


• Apps and Features


Explanation:

Task Manager has many uses. One of which is being able to see performance information for your CPU, memory, hard drive, and other PC components. Another good idea to keep from running low on memory is to add more physical memory.

Device Manager is a program that shows a computer's hardware devices, but it has no feature to show memory utilization.

Disk Management is a tool to format drives and create partitions and volumes. It has no feature to manage physical memory.

Apps and Features is a utility similar to Programs and Features, which allows you to add and remove computer applications from your computer. It has no feature to manage physical memory.

q_itf2_os_workstation

Jennifer wants to change the operating system (OS) on her computer from Windows 10 to Linux. Which of the following OS types allow for this kind of OS replacement?

Answers:

• *Workstation OS


• Server OS


• Mobile OS


• Embedded OS


Explanation:

In many cases, a computer capable of running one workstation OS (such as Windows) can be changed to run a different OS (such as Linux or Unix), which is what Jennifer needs.

A server OS is designed to interface with multiple computer systems, providing services these other computers need. As such, it is often difficult to replace one OS type (such as a Windows server) with another OS type (such as Linux) without making changes to the network environment or networking tools.

Mobile operating systems are used for handheld devices, such as smartwatches, mobile phones, tablets, and even smart speakers. These operating systems run on proprietary hardware, making it difficult to replace the provided OS with another OS.

An embedded operating system (embedded OS) is specialized read-only software designed to perform specific tasks for devices, like digital cameras or ATMs. You cannot change the provided OS with another OS.

q_itf_os_facts_01

Which of the following is NOT an example of an operating system? Answers:

• *Microsoft


• Windows


• Linux


• Android


Explanation:

Microsoft is a company. Windows, Linux, and Android are all operating systems. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_os_facts_02

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)

Answers:

• *Details

• *Processes


• Performance


• Services


• Startup


Explanation:

The Processes tab lets you switch to, start, or end an application. You could also use the Details tab to kill the process associated with the Internet Explorer application. Use either tab to stop a program that is not responding.

The Performance tab shows you overall system utilization and statistics. The Services tab shows a list of background services that are running on the system. The Startup tab shows a list of applications that launch automatically when the computer turns on.

q_itf_os_facts_03

In most operating systems, what is a running application called? Answers:

• *Process


• Task


• Service


• Module


Explanation:

In most operating systems, an instance of a running application is called a process.

Processes can also be instances of services that operate in the background without user input.

Windows Task Manager provides an interface to view processes that are currently running, whether they have been started by applications or services. However, the term "task" generally refers to a unit or thread of program execution. In software development, a module is a discrete piece of code that makes up part of an application.

q_itf_os_facts_04

You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?

Answers:

• *Hypervisor Type 1


• Network Attached Storage


• Solid State Drive


• An Embedded OS


Explanation:

A special type of software called a hypervisor can be used to run multiple operating systems on the same hardware in a process called virtualization.

A Network Attached Storage (NAS) device contains one or more hard drives that users can access over a network.

A Solid State Drive (SSD) is a device with similar capacity to a hard disk drive (HDD) that uses flash storage instead of magnetic disks to store data. SSDs are much faster and more durable than HDDs but are usually more expensive.

An embedded operating system (OS) is specialized read-only software designed to perform specific tasks for a device such as a digital camera or an ATM.

q_itf_os_facts_05

A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?

Answers:

• *Use Task Manager to end task


• Continue to wait


• Reinstall the application


• Repair the application


Explanation:

The user has already waited for the application and therefore the best option is to use Task Manager to kill (or end) the task.

Continuing to wait is not typically a good option if the user has already waited a reasonable amount of time. Reinstalling the application will not resolve a hung state of an application. The task would have to be killed first and the computer might need to be rebooted to close open files before the program could be reinstalled.

Repairing the application is helpful in some cases, but it would also require the application to be closed completely before the repair process could take place.

q_itf_os_facts_06

Which of the following describes the firmware in gaming consoles, TVs, and smart cars? Answers:

• *Embedded OS


• Graphical User Interface


• Device management


• Access control


Explanation:

Many devices, such as gaming consoles, televisions, and smart cars, have embedded operating systems called firmware. A graphical user interface, device management, and access control are not firmware.

q_itf_winsettings_facts_01

On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment?

Answers:

• *Settings


• Finder


• Control Center


• Start Menu


Explanation:

On a Windows operating system, the Settings app allows you to customize many aspects of your computer's performance.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_winsettings_facts_02

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves.

Which of the following are the BEST solutions for securing Joe's workstation? (Select two). Answers:

• *Configure the screen saver to require a password.


• *Configure the screen lock to be applied after a short period of non-use.


• Set a strong password.


• Apply multifactor authentication.


• Change the default account names and passwords.


Explanation:

The best solution is to configure the screen saver or screen lock to be applied after a short period of non-use and to require a password to return to the desktop.

Setting a strong password is a best practice, but is not the best solution in this scenario.

Applying multifactor authentication will make it harder to hack the workstation, but this is not the best solution in this scenario.

Changing the default account names and passwords will make the workstation more secure, but this is not the best solution in this scenario.

q_itf_winsettings_facts_device

You have just purchased a new keyboard and mouse combo and need to configure them. Where in Windows 10 would you go to do this?

Answers:

• Settings > Personalization


• *Settings > Devices


• System > Personalization


• System > Devices


Explanation:

In Windows 10, the Settings App customizes how the computer looks and functions. The Settings App lets you make most configuration changes. To configure a mouse and keyboard, you would go to the Devices section under the Settings App.

The Personalization option lets you change the way the display looks on the monitor.

System is a section in the Settings app and is not where keyboard and mouse configuration would be done. q_itf_winsettings_facts_device_02

You are replacing your graphics card and have uninstalled the driver using the software package. You want to verify that the device is fully uninstalled. Which of the following would be the BEST place to verify the graphics card has been fully uninstalled?

Answers:

• Settings


• *Device Manager


• Control Panel


Explanation:

Even after using the software package to uninstall a driver, the device may still be installed. You should always go to the Device Manager to see if the device is still listed. If it is, you can right-click on the device and uninstall it from there.

Settings allows you to configure and manage installed devices, but not remove them.

The Control Panel allows you to access the Device Manager and other applets. It is not used to remove a device. Add/Remove programs is an applet used to uninstall programs, not devices.

q_itf_winsettings_facts_uninstall

You are replacing your graphics card and want to uninstall the current driver. Which of the following would be the BEST method to uninstall the driver?

Answers:

• *Uninstall the software package.


• Remove the device from Device Manager.


• Remove the device from Control Panel.


• Delete the software folder.


Explanation:

The easiest and most effective method to uninstall a device driver is to uninstall the software package that was originally installed with the device. This should remove all software and drivers associated with the device.

Removing the device from Device Manager is not the best method to uninstall a driver. You cannot remove a device from Control Panel.

Deleting the software folder is not the best option to uninstall a driver. This will often leave other files and registry entries in place for the device.

q_itf2_winregistry._01

Every Windows system has a database that stores setting changes such as switching the home page of your web browser. What is this called?

Answers:

• *Windows Registry


• Operating system


• Computer system


• Embedded OS


Explanation:

The Windows Registry is a database that stores settings for the operating system and other programs.

An operating system (OS) is a computer program that makes it possible for people, hardware, and software to interface with each other in a meaningful way.

A computer system consists of hardware, application software, and a human being that operates the system.

Many devices (such as gaming consoles, televisions, and smart cars) have embedded operating systems called firmware.

4.3 More System Software Section Introduction

As you study this section, keep the following questions in mind:

• What is the relationship between the BIOS and the operating system?


• How can I use utility software to improve the performance of my computer?


After finishing this section, you should be able to:

• Identify and describe different types of system software.


• Explain the purpose of a computer’s BIOS and other firmware.


• Recognize and use utility software.


• Use Windows Device Manager to update drivers.


• Explain how virtualization can be used to extend the capabilities of computer systems.


• Describe each step in the Windows boot sequence.


• Enter the BIOS setup program on your computer.


• Use BIOS settings to identify processor brand, installed memory, BIOS version number, number of hard drives, and NIC status.


• Run an executable program to update the BIOS.


• Clear CMOS settings on the motherboard.


• Create a virtual machine with the following settings. o Startup memory


o Network connection


o Virtual hard disk


o Minimum and maximum RAM


Key terms for this section include the following:

Term Definition


Utility Software

Software that analyzes, configures, and optimizes the computer, including backup software, compression software, disk cleaners, and antivirus software.


Device Drivers

Software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras.


Firmware

Preinstalled, read-only software on a device that tells it how to work.

Windows Settings App

In Windows 10, an application that organizes the settings and customizes how the computer looks and functions.


Windows 10 App

A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.


Basic Input/Output System (BIOS)

A simple program that's written directly into the motherboard's hardware used to initiate hardware in the booting process.


CMOS

The CMOS, an acronym for complementary metal-oxide-semiconductor, is a chip where the BIOS settings are stored.


Power-on Self Test (POST)

A test that ensures that all the system's hardware is in working order before loading the operating system. During this test, an error message may display on the screen notifying you of the faulty component.


UEFI

UEFI, which stands for Unified Extensible Firmware Interface, is a graphical boot tool that is utilized to configure the BIOS for the end user, offering several advantages including faster booting, supporting larger hard drives, and providing more security features.


Virtualization

The process of running a virtual instance of a computer system on its own partition, creating a software-based version of something such as an application, server, network, or storage.


Virtual Machine

A file that acts like a computer but in reality only exists virtually as opposed to physically.


4.3.1 System Software (Lesson Video) Transcript:

There are two types of software: application software and system software. Application software is designed specifically for the end user. Video games, web browsers, database programs, word processors, and this course are all application software. System software controls computer hardware and coordinates the interaction between hardware and application software. An operating system is an example of system software. Three other types are utility software, device drivers, and firmware. In this video, take a short look at each one.

Utility Software analyzes, configures, and optimizes the computer. Unlike application software, which benefits the end user directly, utility software is used to support and maintain the computer system itself. Let's look at a few examples. Backup software is used to copy files from a disk to another location, such as an external hard drive or cloud storage. This is because hard drives can fail and become unreadable. If this happens, you can simply restore your backup instead of losing all your data.

Compression software takes full-size files and applies compression algorithms to shrink the file size, often without losing any data. Compressed files take up less disk space than uncompressed files and are easier to transmit over the Internet or a network.

Disk cleaners find unnecessary files that are saved on a computer, and help decide which files to delete when the hard drive is full.

Antivirus software scans for and deletes malicious code before it can compromise your computer.

A device driver is software that helps an operating system communicate with hardware devices, such as printers, video cards, scanners, and cameras. Let's take printers as an example. There are thousands of printer models available, and each one needs to get instructions from the computer in a slightly different way. It would be impossible and unnecessary

for an operating system such as Windows to know how to communicate with every single kind of printer. Instead, users install the driver for their specific printer, which translates signals from the operating system into instructions the printer can understand.

Firmware is preinstalled, read-only software on a device that tells it how to work. In many ways, it's like a low-level operating system. Firmware can be found in televisions, remote controls, game consoles, printers, cameras, music players, and even automobiles. Sometimes, manufacturers release firmware updates that fix bugs and add new features. In this video, we looked at three types of system software – utility software, drivers, and firmware. Even though we may not see it working, system software is essential for any computer system.

4.3.2 System Software Facts

Unlike application software, which is designed for the end user, system software controls computer hardware and coordinates the interaction between hardware and application software.

This lesson covers the following topics:

• System software


• Common Windows utilities


System Software

An operating system is the most common example of system software. Three other types are utility software, device drivers, and firmware. The table below takes a short look at each one.

Table 1: System Software Term

Description


Utility

Utility software analyzes, configures, and optimizes the computer. Unlike application software,


Device Drivers

A device driver is software that helps an operating system communicate with hardware devices,


Firmware Firmware is read


4.3.3 Update Drivers (Demo Video) Transcript:

In this scenario, you need to update the drivers for two of your hardware devices. First, we'll update the driver for the network adapter. We have the driver saved on a USB flash drive. Switch to the back view of the tower, open the Storage Devices menu, and drag the flash drive to an available USB port. Then, click the monitor to access the computer.

To open device manager, start typing its name into this search field until it appears, then click it. The device manager shows you all the hardware connected to the system, grouped by type. Open Network Adapters, right-click Realtek 8169, and select Update Driver. Since the driver is on the flash drive, click Browse my computer for driver software. Click browse, then scroll down and select the flash drive. Click the Drivers folder, then click OK. When you click next, the computer will install the new driver.

Next, we want to update the drivers for our scanner. Open the Imaging Devices list, right-click the name of the scanner, and select Update Driver. This time, we want to search automatically for updated driver software. Windows automatically finds the new software and installs it for you.

4.3.4 Update Drivers (Simulation) Scenario

You need to update the drivers for two devices in your system, the Realtek network adapter and the Mustek scanner. You have downloaded the driver for the network adapter to a USB thumb drive that is currently on the Shelf.

In this lab, your task is to update the necessary drivers as follows:

• Insert the USB thumb drive in a free USB port.


• Use Device Manager to update the driver for the network adapter using the driver on the USB thumb drive.


• Use Device Manager to update the driver for the scanner by searching Windows Update for the new driver.


Explanation

In this lab, your task is to update the necessary drivers as follows:

• Insert the USB thumb drive in a free USB port.


• Use Device Manager to update the driver for the network adapter using the driver on the USB thumb drive.


• Use Device Manager to update the driver for the scanner by searching Windows Update for the new driver.


Complete this lab as follows:

1. Connect the USB thumb drive as follows: a. Above the computer, select Back to switch to the back view of the computer.


b. On the Shelf, expand Storage Devices .


c. Drag the USB drive from the Shelf to the USB port on the back of the computer.


d. On the monitor, select Click to view Windows 10 to enter the operating system view of the computer.


2. Update the driver for the network adapter: a. Right-click Start and select Device Manager to open Device Manager.


b. In Device Manager, expand Network adapters to update the network adapter driver.


c. Right-click Realtek 8169 and select Update driver .


d. Select Browse my computer for driver software to use the driver on the USB drive.


e. Select Browse .


f. Select JumpDrive (E:) .


g. Click OK .


h. Make sure Include subfolders is selected.


i. Select Next .

j. After the driver is installed, click Close .


3. Update the driver for the scanner: a. Expand Imaging devices to update the scanner driver.


b. Right-click Mustek ScanExpress 1200 Pro and select Update driver .


c. Select Search automatically for updated driver software .


d. After the driver is installed, click Close .


4.3.5 The Boot Process

This lesson covers the topic of the boot process. The Boot Process

The following graphic shows what happens when you turn on (also known as boot) a computer. The process is similar for almost all types of computers, including desktops, laptops, phones, and gaming consoles.

The Boot Process


The boot process flowchart.

The following steps describe the six tasks involved in the boot process. Step 1: Activate the BIOS

Whenever you turn a computer turn on, electricity flows from a power source (such as a wall outlet or battery) into the motherboard. The power activates the basic input/output system (BIOS). A BIOS is a simple program that's written directly into the motherboard's hardware.

Step 2: Check the CMOS

The first thing the BIOS does is look at the complementary metal-oxide-semiconductor (CMOS) chip. The CMOS contains the BIOS settings (instructions) for exactly how each hardware device on the computer should be initialized. Step 3: Initialize Hardware

The BIOS then initializes (wakes up) each piece of hardware according to the instructions it finds in the CMOS. This includes fans, memory, hard drives, and processors.

Step 4: POST

Once everything's been initialized, the BIOS runs a program called power-on self-test (POST). The BIOS checks each hardware device and verifies that it's working properly.

On many computers, the BIOS reports the results of POST with a beep code. A single beep means everything's fine. If there's a problem, it plays a combination of beeps. The user can then refer to the motherboard's documentation to interpret the beep code and find out what the problem is.

Step 5: Find an Operating System

Once POST is done, the BIOS looks for a bootable device or a storage drive that contains an operating system. It does this according to a predetermined boot order, which is stored on the CMOS.

On a typical desktop computer, the first drive in the boot order is the optical drive. If there isn't a disc with an operating system in the tray, the BIOS will check the next drive in the boot order.

Step 6: Load the OS into RAM

Once the BIOS finds an operating system, it loads it into the computer's RAM. From there, the processor starts executing the instructions and the OS takes over. At this point, the job of the BIOS is finished and it becomes dormant.

4.3.6 BIOS Settings

Basic Input/Output System (BIOS) is software that's contained on a memory chip on the computer's motherboard. It is the first software that's run whenever a computer is started. The BIOS runs the computer until the operating system takes over. It's non-volatile, which means its settings are saved and can be recovered after the device has been powered off.

This lesson covers the following topics:

• Computer settings in BIOS


• UEFI


• BIOS and Complementary Metal Oxide Semiconductor (CMOS)


• Clearing CMOS and Resetting BIOS Settings


Computer Settings in BIOS

Many basic functions are controlled through the BIOS, including how the computer is booted up and how the keyboard, mouse, and other input devices work. You can also use BIOS to configure other pieces of hardware such as the hard drive; CD and DVD drives; the CPU; and the computer's memory. Knowing how to adjust BIOS settings can help you solve common computer-related problems and give you greater control over your device.

To access the BIOS, you typically need to restart your computer. You press a certain key as soon as the computer boots up. The key you need to press varies depending on the type of motherboard in the computer. You can look this up in advance, but usually the name of the key will flash briefly on the screen when you first boot up the system. Some commonly used keys are the F1, F2, and Del.

Once you're in the BIOS settings, you can adjust the following.

• The CPU clock, although it's not likely you will have a reason to. You can overclock your computer to run faster than its official speed grade. However, this can make your computer unstable and cause it to needlessly use more power.


• The memory timings but they are usually automatically detected by modern computers. In other words, your computer is probably already using the optimal setting.


The boot order refers to the order in which the computer looks for a device from which to launch an operating system (Windows, macOS, etc.) or an operating system installer. The first thing on the list is tried first, followed by the next, and so on. From within the BIOS settings (see below), you can adjust your computer to initially look at the hard drive, a disc drive, a USB device, or even a network. Typically, you will boot from the hard disk first. However, if you want to install an operating system from a DVD, you can set the BIOS to boot to the optical disk first, allowing the installation to take place. It is also possible to boot from the network adapter to perform a process known as a Preboot Execution Environment (PXE) boot. A PXE boot lets you obtain information and sometimes even operating system from the network instead the hard disk or an optical disk.

The default for most systems is to boot from the optical disk first and if not present, to boot from the USB ports, and finally the hard drive.

UEFI

Unified Extensible Firmware Interface (UEFI) is a graphical boot tool that's utilized in many newer computers. It doesn't replace the BIOS on the computer, but it does the work of configuring the BIOS for the end user.

UEFI offers several advantages over BIOS including faster booting, support for larger hard drives, and more security features (such as checking for malware at startup). It stores everything it needs to start the computer in a special type of file known and an EFI file. This streamlines the booting process and allows UEFI to boot a computer more efficiently. UEFI also offers an easier graphical user interface (GUI) that makes it simpler to navigate.

BIOS and Complementary Metal Oxide Semiconductor (CMOS)

CMOS is a computer chip that works closely with the BIOS program. Sometimes users think of BIOS and CMOS as being the same thing, but they are distinct. The BIOS is software; the CMOS is hardware.

When BIOS starts the computer, it stores essential information (including the system date, time, hardware settings, and other computer configurations) in the CMOS . The CMOS is a small RAM chip attached to the computer's motherboard. While other RAM chips don't keep information stored when the power is disconnected, the CMOS is powered by a small battery that stays on so that it doesn't lose information.

Clearing CMOS and Resetting BIOS Settings

Sometimes if your computer is experiencing major problems, you may want to restore your BIOS settings to their factory defaults. This is done by resetting the CMOS. There are three different ways to accomplish this.

Table 1: CMOS and BIOS Settings Method

Description


First method

To reset the CMOS and return e


Second method

To reset the BIOS by resetting the CMOS battery:


Third Method

If you're trying to reset a desktop computer, you may be able to use the CLEAR CM

4.3.7 Find BIOS Settings (Demo Video) Transcript:

In this lab, we'll access a computer's BIOS to view its settings. Restart the computer. When it gets to this black screen, press F2 enter the BIOS. Down here, we can see information about our computer's processor – its brand, core count, clock speed, and other settings.

Just above that, we can see information about our RAM. This computer has four memory slots on the motherboard. Right now, only one of them has a memory module installed.

At the bottom, we can see information about each of the computer's hard drives. In this computer, they are all hard disk drives, or HDDs.

If we open System Configuration, we can see more settings. For example, this computer's motherboard has an integrated NIC, or network interface card. We can see its current status here. We can also view our computer's current USB configuration. To leave the BIOS and load Windows, click Exit.

4.3.8 Find BIOS Settings (Simulation) Scenario

Restart the computer and press the F2 or Delete key on your keyboard to enter the BIOS setup program. Then explore the current BIOS settings to find the answers to the following questions:

• Which brand of processor is installed?


• How much memory is installed in the computer?


• What is the BIOS version number?


• How many hard drives are installed?


• What is the status of the integrated NIC?


• What is the current status of the USB 3.0 controller?


Explanation

In the lower-left corner of the window, select the Start button. Select Power , then Restart .

When the black screen appears, press the F2 or Delete key on your keyboard to enter the BIOS setup program. The following information can be found in the BIOS/UEFI setup program, under the General category:

• Brand of processor: Intel


• Amount of memory installed: 4096


• BIOS version number: 1610


• Number of hard drives installed: 3 SATA Drives


The following can be found under the System Configuration category:

• Status of the integrated NIC: Enabled


• Status of the USB 3.0 controller: Enabled

4.3.9 Clear CMOS Settings (Demo Video) Transcript:

In this lab, you need to reset the CMOS chip on a computer. If we turn the computer on, it immediately asks for a password. Since the OS hasn't loaded yet, we know this password must be for the BIOS, which means it's stored on the CMOS. Since we don't know the password, we'll have to reset the CMOS to access this computer. Go back to the support office, turn the computer off, and open it up by clicking Motherboard.

To view this motherboard's specifications, select it, then click Details, Specifications. The CMOS battery is labeled as number 6, which is located here. If we keep scrolling down, we get the procedure for resetting the CMOS. We need to unplug the power cord, remove the battery for ten seconds, replace the battery, and plug the power cord back in. Let's do it.

First, let's unplug the power cord. If we select this cord, we see that it goes to the power supply, so it's the one we need to unplug. Next, we can remove the battery by dragging it to the side. We'll wait ten seconds, then pop the battery back into place. Then, we'll plug the computer back in. Switch to the back view, click the power cable, then drag the unconnected end back to the surge protector. When we turn the computer back on, we're no longer prompted for a password.

4.3.10 Clear CMOS Settings (Simulation) Scenario

You are the IT administrator for a small corporate network. You're working on a computer that was assigned to an employee who just left the company. When you try to start it up, it prompts you for a password. You realize that a user password has been set in the BIOS.

On the motherboard, you can remove the battery to clear the CMOS settings. If the motherboard does not have a CMOS battery, there will be a reset button on the motherboard.

In this lab, your task is to clear the CMOS settings and then make sure the computer boots into Windows. Explanation

In this lab, your task is to clear the CMOS settings. Complete this lab as follows:

1. Verify the problem as follows: a. Click the power button on the computer. After the BIOS loads, it prompts you for a password.


b. From the top navigation tabs, select Support Office to return to the hardware view and clear the password.


c. Click the power button on the computer to turn the computer off.


d. Above the computer, select Motherboard to switch to the motherboard view of the computer.


2. Clear the CMOS settings as follows: a. Select the motherboard .


b. In the Selected Component window, select Details for the motherboard.


c. Select the Specifications tab.


d. Read the documentation to identify the recommended procedure and the location of the component that clears the CMOS settings.


e. On the surge protector, drag the power cable connected to the computer and drop it on a clear area of the Workspace to unplug the computer.


f. On the motherboard, move the CMOS battery to the Shelf.


g. Move the CMOS battery back to its original position.

3. Boot the computer to Windows as follows: a. Select the power cable .


b. In the Selected Component window, drag the unconnected end to the surge protector.


c. Above the computer, select Front to switch to the front view of the computer.


d. Click the power button on the computer to turn the computer on.


e. Make sure the computer boots into Windows.


4.3.11 Update Firmware (Demo Video) Transcript:

In this lab, you'll run a firmware update on a Windows computer. First, we'll restart the computer to check the current version of the BIOS. When we get to this screen, we'll press F2 to enter the BIOS. The current version is written up here. Let's exit the BIOS and let the computer finish rebooting.

Once we get back to windows, open file explorer. Navigate to the C drive by clicking This PC, then double-clicking the drive. From here, double-click biosupdater.exe. Whenever you update a BIOS, it's absolutely critical that you don't turn off the computer or lose power during the process. If you do, you could easily ruin the whole system.

Once the update is done, we can restart and check the new version. At this screen, press F2. The new version number is here at the top.

4.3.12 Update Firmware (Simulation) Scenario

You are the IT administrator for a small corporate network. Some of your workstations are having issues, and you need to correct them with a firmware update.

In this lab, your task is to complete the following:

• Restart the computer and press F2 to enter the BIOS. Notice which version of BIOS is currently running.


• Answer Question 1.


• Exit the BIOS and use the biosupdater.exe program at the root of C: to update the BIOS.


• Restart the computer and enter the BIOS again. Notice which version of BIOS is running now.


• Answer Question 2.


Explanation

In this lab, your task is to complete the following:

• Restart the computer and press F2 to enter the BIOS. Notice which version of BIOS is currently running.


• Answer Question 1.


• Exit the BIOS and use the biosupdater.exe program at the root of C: to update the BIOS.


• Restart the computer and enter the BIOS again. Notice which version of BIOS is running now.


• Answer Question 2.

Complete this lab as follows:

1. Check the current BIOS version as follows: a. Select Start .


b. Select Power .


c. Select Restart .


d. As the computer restarts, press F2 to enter the BIOS.


e. On the System Information page, make sure the BIOS version is 1610 .


f. Answer Question 1: Which version of BIOS is running initially?


g. Click Exit to continue to boot the computer.


2. Update the BIOS firmware as follows: a. On the taskbar, open File Explorer .


b. Maximize the window for easier viewing.


c. In the left pane, expand This PC .


d. Select System (C): .


e. Double-click biosupdater.exe .


f. Click Next to update the BIOS version.


g. After the BIOS is successfully updated, click Close .


Try turning the computer off while the firmware update is in progress and see what happens to the computer.

3. Check the new BIOS version as follows: a. Select Start .


b. Select Power .


c. Select Restart .


d. As the computer restarts, press F2 to enter the BIOS.


e. On the System Information page, make sure the BIOS version is 1724 .


f. Answer Question 2: Which version of BIOS is running after the firmware update?


g. Click Exit to continue to boot the computer.

4.3.13 Virtualization

Virtualization is the process of running a virtual instance of a computer system on its own partition. It creates a software- based version of something such as an application, server, network, or storage. For example, this is often used to run multiple operating systems on a single computer at the same time, such as running a version of Windows and a version of macOS on the same system. Using virtualization can help reduce technology expenses and create smoother operating processes.

Virtual Machines

To understand what a virtual machine is, you have to consider the traditional alternative—the physical machine. Usually, a single computer physically occupies space on a desk and runs a single operating system. In contrast, a virtual machine is just a file (also known as an image) that acts like a computer but in reality only exists virtually. In this way, it's like having one computer inside of another. A single computer can run a variety of virtual machines to greatly enhance what it's typically able to do. These virtual machines give the user the same experience as if they were running the program on a dedicated computer.

Hardware and Virtual Machines


Representation of how virutal machines work: Applications, operating systems, and virtual hardware inside of the hypervisor, inside of hardware. Illustration.

Virtual machines don't require any special hardware, but each machine you install does create a drain on your system's available resources. You're limited only by how much the host computer can handle. Multiple virtual machines can run on the same computer, but it's important to make sure you have enough resources on the host computer to support them. All the virtual machines on your computer will access the same physical hardware in order to run. Some things to consider when creating virtual machines are the amount of storage space on the computer, the amount of RAM available, the quality of the video card, and the quality of the processor.

If you're running a server, multiple operating systems can run side by side and be controlled by a program called a hypervisor. If you're simply using a regular desktop computer, the additional operating systems will open up in a program window just like any other program.

Common Uses for Virtual Machines

Virtual machines have a variety of uses, including the following:

Compatibility

One common use for virtual machines is to run non-compatible software. For example, if you're using a Mac computer and you want to run a program that's only intended for Windows, you can run a virtual copy of Windows on your Mac and use the software through the virtual machine. You can also use a virtual machine to run old apps that won't run on a newer operating system.

Backup and Preservation

Creating a virtual machine can help you retain access to critical files even if a specific physical machine breaks down. In the event of a hard drive crash, you can simply move to another physical machine and access the virtual machine to retrieve the data. You can also use virtual machines to preserve what are known as legacy systems, which are outdated pieces of hardware or software that are no longer in use. People like to retain access to legacy systems because the data stored on them might still be useful.

Testing

If you want to test out how a new operating system or piece of software is going to run on a physical machine, you start by using a virtual machine. If everything appears to be in order, you can go ahead and install the software or operating system

on your physical machine. This process is called using a "sandbox," which means you're testing something in a safe environment to see how it reacts before pushing it onto an actual environment.

4.3.14 Enable VT in the BIOS (Demo Video) Transcript:

In this lab, you need to enable virtualization technology, or VT, in a computer's BIOS. This will allow you to run a virtual machine on the computer. To access the BIOS, restart the computer. When it gets to this black screen, press F2. Open Virtualization Support and select Virtualization from the menu. Check the Enable Intel Virtualization Technology box, click Apply, then exit the BIOS.

4.3.15 Enable VT in the BIOS (Simulation) Scenario

You are the IT administrator for a small corporate network. The employee in Office 1 will use her computer to run a

virtual machine. You need to enable virtualization technology (VT) in the BIOS. In this lab, your task is to complete the following:

• Restart the computer.


• As the computer boots, press F2 to enter the BIOS configuration utility.


• Enable VT.


• Save your changes.


• Restart the computer to verify the changes you have made.


While on the BIOS screens, select Send Ctrl + Alt + Del at the bottom of the screen to restart the computer if necessary. Explanation

In this lab, your task is to complete the following:

• Restart the computer.


• As the computer boots, press F2 to enter the BIOS configuration utility.


• Enable VT.


• Save your changes.


• Restart the computer to verify the changes you have made.


Complete this lab as follows:

1. Select Start .


2. Select Power .


3. Select Restart .


4. When you see the BIOS loading screen, press F2 to enter the BIOS.


5. In the left pane, expand Virtualization Support .


6. Select Virtualization .


7. Select Enable Intel Virtualization Technology .


8. Select Apply to save the changes.


9. Select Exit . The system reboots.


4.3.16 Create Virtual Machines (Demo Video) Transcript:

In this lab, you want to create a virtual machine on your computer. To start, search for and open Hyper-V Manager. Right-click ITAdmin, which is the name of your computer, and select New > Virtual Machine. This opens a wizard where we can configure the new VM.

First, we give the machine a name and set its location. Next, we pick its generation. On this screen, we choose how much of our computer's memory to allocate to the VM. We can also enable dynamic memory. With this box checked, the VM

will use only the memory resources it needs at a given time. Unused memory can be allocated to another VM. We'll set the network connection to Internal. This will allow the Hyper-V host to access the VM via a network connection but will prevent the VM from interacting with external networks like the Internet.

On this page, we allocate part of our computer's hard disk to be used by the VM. Here, we could choose to install an operating system. In this example, we'll do it later. When we click Finish, the VM is created. We can see the machine here in this menu.

Finally, let's adjust the VM's memory allocation. Right-click the VM, then click Settings. From here, we can specify the maximum and minimum amount of RAM this VM is allowed to use. When we're done, click OK.

4.3.17 Create Virtual Machines (Simulation) Scenario

You have installed Hyper-V on ITAdmin. You would like to install a virtual machine to evaluate some software. In this lab, your task is to create a virtual machine named Test1. Use the following settings for the new machine:

• Virtual machine name: Test1 .


• Virtual machine location: D:\HYPERV .


• Generation: Generation 2 .


• Startup memory: 2048 MB - Use Dynamic Memory.


• Networking connection: Internal .


• Virtual hard disk name: Test1.vhdx .


• Virtual hard disk location: D:\HYPERV\Virtual Hard Disks .


• Virtual hard disk size: 200 GB .


• Operating system will be installed later.


• Minimum RAM: 1024 MB .


• Maximum RAM: 8192 MB .


Explanation

You can create a new virtual hard disk when you create a virtual machine. Virtual disks created along with virtual machines are dynamically expanding disks. If you need to create any other kind of disk, you can either create the disk before the virtual machine or convert the disk type after.

Create Test1 on ITAdmin as follows:

1. In the bottom-left of the task bar, click inside the Type here to search box.


2. Begin typing Hyper-V Manager , then select the app from the Best match listing.


3. Right-click ITADMIN .


4. Select New > Virtual Machine .


5. In the Before You Begin window, select Next .


6. In the Name field, enter Test1 for the virtual machine.


7. Select Store the virtual machine in a different location to modify the path to the virtual machine files.

8. In the Location field, make sure D:\HYPERV appears in the field and then select Next .


9. Select Generation 2 and then select Next .


10. In the Startup memory field, enter 2048 MB of memory to use with the virtual machine.


11. Mark Use Dynamic Memory for this virtual machine and then select Next .


12. In the Connection field, select Internal from the drop-down list and then select Next .


13. Make sure Create a virtual hard disk is selected. a. In the Name field, make sure Test1.vhdx appears.


b. In the location field, make sure D:\HYPERV\Virtual Hard Disks appears.


c. In the Size field, enter 200 and then select Next .


14. Make sure that Install an operating system later is selected and then select Next .


15. Select Finish to create the virtual machine.


16. Under Virtual Machines, right-click Test1 to adjust virtual machine memory.


17. Select Settings .


18. From the left pane, select Memory .


19. In the Minimum RAM field, enter 1024 .


20. In the Maximum RAM field, enter 8192 and then select OK .


4.3.18 Section Quiz (Section Quiz) q_itf2_driveUtil_01

Drag the system component on the left to the device or program that fits with the system component. Answers:

• Utility software


• Device drivers


• Firmware


Explanation:

Utility software analyzes, configures, and optimizes a computer. Some common types of utility software are backup software, compression software, disk cleaners, and antivirus software.

Firmware is preinstalled, read-only software that tells a device how to work. Firmware can be found in televisions, remote controls, game consoles, printers, cameras, music players, and even automobiles.

A device driver is software that helps an operating system communicate with hardware devices such as printers, video cards, scanners, and cameras.

q_itf2_driveutil_explorer

Timothy is using a computer that's running a Windows OS. He wants to rename a file on his local hard drive. Which of

the following tools should he use? Answers:

• Device Manager


• *File Explorer


• Windows Settings


• Task Manager


Explanation:

File Explorer, formerly known as Windows Explorer, is a file management application that comes with Windows. File Explorer's main purpose is to let you view, open, copy, move, and otherwise manage your files and folders.

Device Manager is a Windows utility that lets you view and control peripheral devices and other hardware components. It does not provide file and folder management features.

Windows Settings is an application in Windows 10 that lets you organize Windows settings and customize how the computer looks and feels. It does not provide file and folder management features.

Task Manager lets users perform tasks such as shutting down applications that are not responding or viewing which processes and applications are using system resources. It does not provide file and folder management features. q_itf2_driveutil_plugnplay

Lorraine, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken. Which of the following installation types does this BEST describe?

Answers:

• Manual


• Web based


• *Plug-and-play


• Hot-swappable


Explanation:

Plug-and-play driver installation means that when the device is plugged in, Windows automatically detects the device and installs the driver. Because Lorraine was able to plug in the mouse and no further interaction was needed, this scenario describes a plug-and-play driver installation.

A manual driver installation involves the user obtaining the driver software and installing the software themselves. A web-based driver installation is when the driver is obtained through Windows Update or from the internet.

A hot-swappable device is one that can be unplugged and plugged in when the computer is running. This is not an installation type.

q_itf_driveutil_sys_soft_facts_01

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software? Answers:

• *Utility Software


• Operating System


• Device Drivers


• Firmware


Explanation:

Utility software analyzes, configures, optimizes, or maintains a computer system. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_driveutil_sys_soft_facts_02

Which category of system software provides a platform for application software to run on? Answers:

• *Operating System


• Utility Software


• Device Drivers


• Firmware


Explanation:

Operating systems provide a platform that other applications can run on. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_driveutil_sys_soft_facts_03

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner? Answers:

• *Device drivers


• Operating System


• Utility software


• Firmware


Explanation:

Device drivers help computers to communicate with hardware peripherals from different manufacturers. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_driveutil_sys_soft_facts_04

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions? Answers:

• *Firmware


• Device Drivers


• Operating System


• Utility Software


Explanation:

Firmware functions as a rudimentary operating system for electronic devices that wouldn't normally be considered "computers."

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_driveutil_sys_soft_facts_05

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old

speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted.

Which of the following BEST describes the next step you should perform? Answers:

• *Check the vendor's website for an updated driver.


• Replace the speakers.


• Manually change the IRQ settings for the card.


• Replace your sound card.


Explanation:

Check the vendor's website for an updated driver before further troubleshooting. Because the speakers worked before, you probably won't need to replace the speakers. PCI cards are plug-and-play, meaning that you should not need to manually configure resources such as IRQs. You should troubleshoot the problem completely before you resort to replacing the sound card.

q_itf_driveutil_sys_soft_facts_06

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive.

Which Windows utility will allow you to manually update this new driver? Answers:

• *Device Manager


• Internet Properties


• Network and Sharing Center


• Driver Manager


Explanation:

Device Manager allows you to view installed devices and their status, update drivers, and disable or uninstall devices. From Network and Sharing Center you can view the status of your network and Internet connections, change or set up new connections, or troubleshoot network problems. From Internet Properties you can configure general settings associated with your computer's connection to the Internet. You can configure settings related to security, privacy, content, and several other types of settings. Driver Manager is not a Windows utility. q_itf_driveutil_sys_soft_facts_07

Carrol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do next to be able to send print jobs to the printer?

Answers:

• *Install the latest printer driver


• Check for operating system updates


• Upgrade the firmware on the printer


• Connect the printer to the network instead of a USB cable


Explanation:

The next step would be to install the latest printer driver, which will allow the printer to be recognized by the operating

system.

Checking for operating system updates will only update the operating system.

Upgrading the firmware would not be the next step. If the driver installation didn't resolve the issue, the firmware update may help resolve the issue if it is recommended by the printer manufacture.

Connecting the printer to the network is often more problematic than a direct connection. Many printer manufacturers suggest connecting the printer via a USB cable as part of troubleshooting, but not the other way around. q_itf2_biosSettings_01

Which component gets things running until the operating system takes over? Answers:

• *BIOS


• CPU


• Firmware


• Memory


Explanation:

The basic input/output system (BIOS) is software that is contained on a memory chip on the computer's motherboard and is the first software that is run whenever a computer is started. It gets things running until the operating system takes over. The BIOS is created in such a way that it is non-volatile, which means that its settings are saved and can be recovered even after the device has been powered off.

Firmware functions as a rudimentary operating system for electronic devices that wouldn't normally be considered computers.

A processor, also known as a Central Processing Unit (CPU), is equivalent to the brains of your computer.

RAM, or random access memory, keeps track of instructions and values that your computer is working with at a given time.

q_itf2_virtualization_01

You need to test a version of macOS but only have a Windows computer. What technology could you use? Answers:

• Firmware/BIOS


• *Virtualization


• Supercomputer


• Embedded OS


Explanation:

Virtualization is the process of running a virtual instance of a computer system in its own partition on a computer. It creates a software-based representation of something, such as an application, server, network, or storage. This is often done in order to run multiple operating systems on a single computer, such as running a version of Windows and a version of macOS on the same system. Using virtualization can help reduce technological expenses and create smoother operating processes.

An embedded operating system (embedded OS) is specialized read-only software designed to perform specific tasks for devices like digital cameras or ATMs.

Firmware/BIOS provide persistent storage while the computer is powered off. They do this, however, for system settings but not user data.

A supercomputer is a name given to the fastest, most powerful computers of a time period.

4.4 File Management Section Introduction

As you study this section, answer the following questions:

• How can you use a file system to organize files?


• What is the relationship between files and directories?


• Why is it important to limit a user's file permissions?


In this section, you will learn to:

• Compare and contrast the features of various file systems.


• Create folders in the Windows file system.


• Copy, rename, and delete files in Windows.


• Share a Windows folder with users and grant them specific access to files within the folder.


• Use the Windows Recycle Bin.


• Manage files using both a command line and a graphical user interface.


• Explain how NTFS and share permissions work together to control access to Windows files and folders.


• Add and remove users from access control lists.


• Assign specific folder permissions to user groups.


• Use the following Windows PowerShell commands. o Change directories.


o View files and folders.


o Make a directory.


o Copy files to other folders.


o Stop a process.


o Map a drive to a shared folder.


• Use the Linux command line to add, copy, rename, modify, and delete files.


• Copy a file from a thumb drive to a folder on your hard drive.


• Safely remove a thumb drive from a Windows system.


Key terms for this section include: Term

Definition

File

The smallest container within a computer's storage system that is used to store information such as data, settings, and commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.


File format

The way in which the content of a file is organized. Often, a file type is indicated by the file extension such as .jpg, .gif,

.png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.


File system

The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.


File permissions

The use of user and file attributes to control the actions a user can perform (read, write, delete, etc.) on each file. Also known as usage restrictions.


Journaling

The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.


NTFS

A journaling file system that allows you to choose the users or groups that can access files and folders.


Command line interface

An interface that allows a user to interact with the computer through input from the keyboard. The input is entered as commands. The command line is used primarily by IT and other tech professionals.


4.4.1 Windows File Management (Lesson Video) Transcript:

In this lesson, we're going to learn how to manage files on a Windows system. Files are used to store information. For example, when you create a word processing document in Microsoft Word and save it, it is saved in a file.

Here we have some text written in a Word document. We'll save it as a file called Chapter 1. Now if we were to close Word and then restart it, we can open the file and still access the information it contains.

To keep things organized, files can be sorted into different folders. Let's open this computer's hard drive, which is designated by the letter 'C:'. A Windows system comes with several default folders already created for you to use. Windows contains the Windows operating system files. Program Files and Program Files (x86) contain the files for the applications installed on your system. Users contains the files associated with your user account on the system.

This is called the user's profile. Within this user's profile are several folders that are used to organize information. Let's create a new folder within Documents. To create a new folder, right-click within the folder in File Explorer where you want the new folder to reside, then select New, then Folder. Give the new folder a name. Let's name this one Research. Let's create another folder named Accounting within Documents. To further organize your information, you can create folders within folders. Let's go into the Research folder and create a new folder named Schedule and another new folder called Design. Now you can save schedule-related files in the Schedule folder and design-related files in the Design folder. For example, to create a new Microsoft Excel spreadsheet that can be used for managing due dates, we can right- click the

folder and then select New, then Microsoft Excel Worksheet. Let's name the file 'Due dates'. Now we can double-click this file to load Excel and add information.

Every file on your system has two attributes that uniquely identify it from the other files on the same system. The filename, which is simply the name we assign to the file, and its path, which lists all of the folders within which the file resides, starting at the top of the drive, which is called the root folder, down to the current folder. In this example, the name of this file is 'Due dates', and its path is 'C:\Users\sdecker\Documents\Research\Schedule.' C: is the root folder, which contains the Users folder, which contains the sdecker folder, and so on.

You can reorganize the files and folders on your system in a manner that best fits your needs. Suppose you decide that the Chapter 1 file is in the wrong folder. It actually belongs in the Design folder within the Research folder. Now one option is to copy it to the desired folder. Select the file. On the Home tab of the File Explorer ribbon, select Copy.

Navigate to the Research folder, then to the Design folder. On the Home tab, select Paste.

In addition to copying files and folders, you can move them as well. Moving a file or folder will also make a copy in the new location, but the original file or folder will be deleted. Now suppose you decided that the Chapter 1 file is in the wrong location. You want it to be in the Research directory, not the Design directory. Select the file and on the Home tab, select Cut. Navigate to the Research folder. Back on the ribbon, select Paste. The file has been moved from the Design folder to the Research folder.

If necessary, you can also rename a file or folder. Suppose we wanted to do this with the Chapter 1 file: select the file, then click Rename. Enter a new name for the file. Let's use Chapter 2 for a filename.

There will be times when you'll need to completely remove a file or folder from the system. In this case, let's delete the Chapter 2 file: select the file, then click Delete. A file or folder that is deleted within Windows isn't immediately removed from the system. Deleted files are moved to the Recycle Bin in case you want to retrieve them. Here you see the Chapter 2 file we just deleted. We have two options. To restore the file, click on it and then select Restore the selected items. To permanently delete the file, click Empty Recycle Bin.

On Windows, every file has a file extension. File extensions determine what application will be used by default to open a data file. For example, if I double-click on the Chapter 1 file, it is automatically loaded in Word. By default, the file extensions are hidden in Windows. If you access the properties of a file, you can view its extension. The Chapter 1 file has an extension of .docx, which means it will open in Word by default. You can also manually modify file associations to customize which application particular file types open in by default.

Let's create a new file within the Design folder. If we access the properties of this file, we see that it has a .txt extension, which is opened with Notepad by default. Suppose we want to open these files in WordPad instead: click Change, select WordPad, and then click OK. Click OK again. If you double click this file, it now opens in WordPad instead of Notepad. In this lesson, we discussed how to manage files on a Windows system. We talked about how to create files; how to copy, move, and delete files; and how to manage file associations.

4.4.2 Windows File Management Facts This lesson covers the following topics:

• Windows file management


• Linux file management


Windows File Management

Files are used to store information on a computer's storage devices. Every file has two attributes that uniquely identify it from other files on the same system.

• The file's name.


• The file's path. This is a list of the folders that the file resides in. It starts at the top of the drive (the root folder) down to the current folder.


You can use folders to keep information organized. When the Windows operating system is installed, several default folders are automatically created for you. The following table describes several of these folders.

Table 1: Default Windows Folders Folder

Description


C:\Windows

Contains the Windows operating system files.


C:

Contain the files for the applications installed on the system.

C:\Users

Contains the information associated with a Windows user account. This folder is


You can reorganize the files and folders on your storage devices and even create new files and folders using File Explorer. The following table describes how to perform key management tasks.

Table 2: Windows File and Folder Management Tasks Task

Description


Create a new folder

To create a new folder:


Create a new

To create a new file:


Copy a file

To copy a file from one folder to another:


Move a file

To move a file (or folder) from one folder to another by using the Cut command:


Rename a file

To assign a new name to a file (or folder):


Delete a file

To remove a file or folder from the system:


You can use NTFS permissions (a form of usage restrictions) to help control the users who can read, write, move, or delete each file. The following table describes NTFS permissions.

Table 3: Standard NTFS Permissions on Windows Permission

Rights


Full Control

Users can view or change file attributes, create files, delete files, execute files, compress


Read and

Users can view file attributes and execute files, but they cannot create, delete, or modify files.


Write

Users can change file attributes, write data to files, view file permissions, and ownership, but


Modify

Users have all Read, Execute, and Write permissions, plus the ability to add or delete files.


Read

Users can view files and file attributes, but cannot execute or modify files.


Windows requires executable files to have a file extension such as .com or .exe. Other file extensions determine the application that is used by default to open it. The following table includes some examples:

Table 4: Common File Extensions Extension

Description


.txt

A text file that opens with Notepad by default.


.pdf

An Adobe Acrobat Reader file.


.jpg, .bmp, or .png

An image file that opens with the Photos app by default.


.zip

A compressed file that contains other files. A compressed file opens with File


.wav, .mp3, .wma, or

An audio file that opens with Microsoft's Groove Music app by

.doc or docx

A Microsoft Word document.


.xls or .xlsx

A Microsoft Excel spreadsheet file.


.ppt or .pptx

A Microsoft PowerPoint presentation file.


.accdb

A Microsoft Access database file.


On Windows, file extensions are hidden by default. If you access the properties of a file, you can view its extension as well as specify the application that opens the file type by default. To do this, complete the following steps:

1. Access the properties of the file.


2. Under Opens with , click Change .


3. Select the desired default application, and then click OK > OK .


Linux File Management

Linux based systems also have a file system. However, there are several differences from the Windows file system.

• Linux refers to its folders as directories. It does not use drive letters.


• When referencing a path to a specific directory, Linux uses the forward slash (/), such as /home/Zoey, instead of the backslash (\).


• Everything in Linux is located under the / directory, known as the root directory. It is similar to Windows C:\.


The following table shows a few of the common directories found on a Linux system. Table 5: Common Linux Directories

Directory Description


/

Is known as the root directory. All other


/home Contains sub


/bin

Contains the binaries (or programs) required to mount the system in single


/boot

Contains the files needed to boot the system.


/usr

Contains applications and files used by users.


/etc

Contains configuration files. When needed, you can typically change configuration files using a


/dev

Contains a number of special files that represent devices.


In Linux, everything is a file; this includes devices. As seen in the previous table, these devices are stored in the /dev directory. For example, many systems use a SATA hard drive. The files for this drive would normally be saved in the

/dev/sda directory.

It is also important to know that when working with files and directories in Linux, everything is case sensitive. For example, if you were currently in the /home directory and wanted to change to a directory named Pascal, you enter cd Pascal not cd pascal .

4.4.3 Manage Files and Folders (Demo Video) Transcript:

In this scenario, you're organizing files and folders on your computer for a beginning Latin class. First, you need to make a new folder. To do this, navigate to the documents folder by opening File Explorer and clicking Documents. Click New Folder, give the folder a name, and press Enter.

Next, you need to copy a file into this folder. Navigate to the D drive, right-click the ipsum.docx file, and select Copy. Go back to the documents folder, open the Latin 101 folder, right-click, and choose Paste.

Now we want to delete a file. Navigate to the documents folder, select the lorem.docx file, and press Delete on your keyboard. When the computer asks if you're sure, click Yes.

Next, let's rename a file. Navigate to the D drive. Click the name of the file you want to rename twice, waiting at least a second between clicks. Adjust the name of the file, then press Enter.

Now we want to restore a file from the Recycle Bin. Close file explorer, then double-click the Recycle bin. Right-click the ipsum2.docx file, then choose Restore.

Finally, we want to permanently delete the remaining file in the Recycle Bin. To do this, click Empty Recycle Bin. When the computer asks if you're sure, click Yes.

4.4.4 Manage Files and Folders (Simulation) Scenario

Your major requires you to take Latin 101 during your sophomore year in college. You are using your Windows notebook and Microsoft Office to complete your first homework assignment. In addition to copying and renaming files from your USB thumb drive, you need to delete an unneeded file on your hard drive and restore a file that you accidentally deleted.

Complete the following tasks:

1. Create a new folder named Latin 101 in the Documents folder on your PC.


2. Copy the D:\ipsum.docx file to the Latin 101 folder you just created in Documents .


3. Delete the lorem.docx file from the Documents folder.


4. Rename the D:\ipsum(draft).docx file to ipsum_draft.docx .


5. Restore the ipsum2.docx file from the Recycle Bin to the Documents folder.


6. Empty the Recycle Bin.


Explanation

To complete this lab, use File Explorer to manage files and folders. To create the Latin 101 folder, do the following:

1. At the bottom of the screen, click the File Explorer icon.


2. In the File Explorer window, in the right pane double-click the Documents folder.

3. On the Home tab, in the New group, click New folder .


4. With the text of the New Folder name selected, type Latin 101 and press Enter .


To copy the ipsum.docx file, do the following:

1. In File Explorer, in the left Navigation pane , scroll down and select Data (D:) .


2. Right-click the ipsum.docx file and then select Copy .


3. To navigate to the destination folder, scroll up in the Navigation pane and select Documents > Latin 101 .


4. Right-click anywhere within the Latin 101 folder, then click Paste .


To delete the lorem.docx file from the Documents folder, do the following:

1. In File Explorer, in the left Navigation pane , scroll and select Documents .


2. Right-click the lorem.docx file and then select Delete .


3. Select Yes to confirm the deletion.


To rename the D:\ipsum(draft).docx file, do the following:

1. In File Explorer, in the left Navigation pane , scroll down and select Data (D:) .


2. Right-click the ipsum(draft).docx file and then select Rename .


3. Type the filename as ipsum_draft.docx and press Enter .


To restore the ipsum2.docx file from the Recycle Bin, do the following:

1. On the PC desktop, in the upper-left corner of the screen, double-click the Recycle Bin.


2. Right-click the ipsum2.docx file and click Restore . The ipsum2.docx file is restored to your Documents folder, where it resided before it was deleted.


To empty the Recycle Bin:

1. On the desktop, right-click the Recycle Bin and select Empty Recycle Bin .


2. In the Delete File dialog box, click Yes . The lorem.docx file is permanently deleted.


4.4.5 Assign File Permissions (Demo Video) Transcript:

In this scenario, you need to share a folder on your computer with your classmates so you can work together on a group project. First, open file explorer, then navigate to the D drive. Right-click the Latin 101 folder, go to Give Access To, and click Specific People.

Next, we want to add Sam, Susan, and John to the list of people to share with. Select each name from this dropdown and click Add. Then, change Sam and Susan's permission level to Read/Write. When you're done, click Share, then click Done.

Finally, we want to copy a file into this shared folder. Go to Documents, then open the Latin 101 folder. Right-click the

file and select copy. Go back to the D drive, open the Latin 101 folder there, right-click, and select Paste.

4.4.6 Assign File Permissions (Simulation) Scenario

You have been assigned to work on a group project with several other students in your Latin 101 class.

As a part of the collaboration process, you need to share a folder on your computer's hard disk drive to make the files within it available to the other members of the project team through the campus network.

The other team members need to be able to open, modify, and save changes to the files in the shared folder. The Teaching Assistant (TA) for the class should also have access to the shared folder, but he should not be allowed to make any changes.

Your task in this lab is to:

• Give Sam, Susan and John access to the D:\Latin 101 folder


• Grant the following permissions to the shared folder: o Sam: Read/Write


o Susan: Read/Write


o John (TA): Read


• Copy the lorem.txt file from the Documents\Latin 101 folder to the D:\Latin 101 shared folder to make the file available to the other team members.


Explanation

To complete this lab, do the following:

1. At the bottom of the screen, click the File Explorer icon.


2. In the File Explorer window, in the left Navigation pane, click This PC .


3. In the right pane, scroll down and double-click the Data (D:) volume.


4. Right-click the Latin 101 folder, and then select Give access to > Specific people... .


5. In the drop-down list, select the user named Sam and then click Add .


6. For the Sam user, change the Permission Level to Read/Write (click the permission level dropdown arrow next to Sam

, then select Read/Write ).


7. Repeat this process to add the Susan user and give her Read/Write access.


8. In the drop-down list, select the user named John and then click Add .


9. For the John user, make sure the Permission Level is set to Read .


10. Click Share .


11. When prompted that the Latin 101 folder has been shared, click Done .


12. In File Explorer, in the left Navigation pane, scroll up and click the Documents folder.


13. In the right pane double-click the Latin 101 folder.

14. Right-click the lorem.txt file and then click Copy .


15. In the left Navigation pane, scroll back down, expand Data (D:) and then select the Latin 101 folder.


16. Right-click anywhere within the Latin 101 folder and then click Paste .


4.4.7 Copy Files from a USB Thumb Drive (Demo Video) Transcript:

In this scenario, we want to copy a file from a flash drive to the hard drive on our computer. Switch to the back view of the computer, then zoom in on the USB ports. Drag the flash drive from the shelf into an empty port. Click the monitor. The flash drive is mapped as the E drive. Open file explorer, click This PC, then double-click the E drive. Open the Latin 101 folder, right-click the file, then click Copy. Go back to This PC and open the Documents folder. Open the Latin 101 folder, right-click, and select Paste.

Now, let's remove the flash drive. Click this arrow to expand the system tray, click the flash drive icon, then click Eject USB Disk. Now we can switch back to the hardware view and drag the flash drive back to the shelf.

4.4.8 Copy Files from a USB Thumb Drive (Simulation) Scenario

A friend in your Latin 101 class took notes for you on a day you were absent. She saved them in a Word document named lorem.docx on a removable USB thumb drive.

The thumb drive is currently on the shelf. Your task in this lab is to copy the lorem.docx file from the drive to your desktop system.

Complete the following steps:

1. Insert the USB thumb drive into a free USB port. Verify that the system detects the device.


2. Copy the lorem.docx file in the Latin 101 folder on the thumb drive to the Latin 101 folder within the Documents folder on your computer.


3. Remove the thumb drive from the USB port. Be sure to stop the device properly in Windows before removing it.


Explanation

To complete this lab, perform the following steps:

1. In the Workspace, switch to the back view of the computer.


2. Expand the Storage Devices category on the Shelf.


3. Drag the USB thumb drive from the Shelf to the empty USB port on the back of the computer.


4. Click on the monitor to switch to the operating system view of the computer.


5. In the lower right corner of the screen, click Tap to choose what happens with removable drives.


6. In the AutoPlay pop-up window, click Open folder to view files .


7. With JumpDrive E: selected in the File Explorer window, double-click the Latin 101 folder.


8. Right-click the lorem.docx file and then select Copy .


9. In the left Navigation pane , scroll up and click Documents .


10. Right-click the Latin 101 folder, and then click Paste .

11. To prepare the USB drive for removal, click the ^ icon in the System Tray (near the bottom-right corner of the screen).


12. Click the Safely Remove Hardware and Eject Media icon.


13. Select Eject USB DISK .


14. Notice the Safe to Remove Hardware prompt.


15. To remove the USB drive, switch to the hardware view by clicking on the My-PC button at the top of the window.


16. Drag the USB drive from the computer and release it. This disconnects the drive while leaving it on the Workspace.


4.4.9 NTFS Permissions

New Technology File System (NTFS) is a journaling file system initially developed by Microsoft in 1993 with the release of Windows NT 3.1. This system allows you to choose the users or groups that can access files and folders. It also controls what the user or group can do with the content.

Since NTFS is a journaling file system, it provides a way for system changes to be written to a log before the changes are made. This allows the file system to revert to previous versions of permissions if needed. NTFS is the principal file system used with Microsoft's operating systems.

This lesson covers the following topics:

• Folder permissions


• File permissions


• Cumulative and inherited permissions


• File attributes


Folder Permissions

NTFS allows permissions such as Read, Write, and Execute to be set for specific folders and files. Folder and file permissions allow different actions to be performed on the content. They are set separately.

When assigning permissions, always use the principle of least privilege. This principle states that a user should be given only the permissions needed to do the job and no more. Administrators can set folder permissions for user accounts or groups by choosing from the following standard NTFS folder permissions:

Folder Permissions Permission Description


Read

Allows you to see files and subfolders within the folder. You can also view folder


Write

Allows you to create new files and subfolders within the current folder; change folder


List folder contents

Allow you to see the names of files and subfolders in the current folder.


Read & Execute

Allow you to navigate through folders to reach other content, even if you don't have Modify Folder

Allow you to delete


Full control Folder

Allow you to change permissions, take ownership, and delete subfolders and files as


File Permissions

NTFS permissions also control the access that users or groups have to files. Like folder permissions, these settings delegate how the user or group can interact with each file.

The following are the standard NTFS file permissions that can be assigned by an administrator and the type of access that each permission allows.


Permission Description


Read file permissions

Allow you to read the file attributes, ownership, and permissions.


Write file permissions

Allow you to overwrite the file, change file attributes, and view file ownership and


Read & Execute file

Allow you to run the application and perform actions permitted by the Read


Modify file permissions

Allow you to modify and delete the file; and to perform actions permitted by Write


Full Control file

Allow you to change permissions, take ownership of the file, and perform all ac


The following chart identifies overall NTFS permissions. Overall NTFS Permissions


NTFS permissions comparison checklist. Cumulative and Inherited Permissions

In all cases, a user's permissions are the sum of the NTFS permissions that are assigned to the individual's user account and groups. For example, if you have Read permissions for a folder but have Write permissions for the same folder because of a group permission, you have both Read and Write permissions.

Also, NTFS file permissions always take precedence over NTFS folder permissions. This means that you can access files you have permissions for by using the local path, even though the folder in which it resides may be invisible to you.

A permission can also be overridden for a specific user or group by specifically denying the permission. This is not recommended as it overrides all instances where permissions are allowed. By default, all permissions assigned to a parent folder are inherited by its subfolders and files. Any new files and subfolders that are created in the folder receive this inheritance as well.

File Attributes

Besides permissions, which are security controls, files and folders have attributes which:

• Describe the files.


• Affect how the file and folders behave in a file system.


• Apply regardless of the security permissions assigned to the file or folder.

Some attribute descriptors are its size; and when it was created, accessed, or changed. These attributes cannot be altered, but there are attributes that can be enabled as follows:

• Archive - Enable to display that the file has been altered since the previous backup.


• Hidden - Enable to make the file invisible when browsing folders.


• System - Enable to indicate a critical system file and keep the file hidden, unless specifically asked to be shown.


• Read-only: Enable to limit modification of the file unless it has explicit permission.


There are extended attributes which include:

• Compressed - Enable to compress the file when stored.


• Encrypted - Enable to encrypt the file when stored.


• Not Content-Indexed - Enable to not include the file in the indexing operation.


4.4.10 Configure NTFS Permissions (Demo Video) Transcript:

In this lab, we have a computer that's shared by the marketing and sales departments at an organization. We need to adjust permissions so only marketing employees can access the marketing folder and only sales employees can access the sales folder.

To start, we'll navigate to the folders. Open File Explorer, click This PC, then double-click the E drive. We'll start by fixing the Marketing Data folder. Right-click the folder, then click properties, then Security. Click Advanced. Right now, this folder has inherited permissions. That is to say, the permissions of the folder are the same as the permissions of the drive that contains the folder. To disable inheritance, click here. Instead of inherited permissions, we want explicit permissions. In other words, we want to specify exactly who can and can't access this folder.

Right now, all users are allowed into the folder. Let's select users from the list and click Remove. Next, let's add the marketing group to give them explicit permission to use the folder. On the properties dialog box, click Edit. Click Add to add a new group. Type Marketing, then click Check Names. The name is now underlined, which means the computer found the group we were looking for. Click OK. Now that the marketing group is added to the permissions list, select the group and check Full control. Click OK to close the dialog box.

Next, we need to do the same thing for the Sales Data folder. We'll follow the exact same steps as before. Right-click, Properties, Security, Advanced, Disable inheritance, convert to explicit permissions, remove users, OK, Edit, Add, Sales, Check Names, OK, Full Control, OK. Now, each folder can only be accessed by members of its specific organization.

And, of course, by administrators like us.

4.4.11 Configure NTFS Permissions (Simulation) Scenario

There are two groups of users who access the Office1 computer, Marketing and Sales. Each group has a corresponding folder:

• E:\Marketing Data


• E:\Sales Data


In this lab, your task is to:

1. Disable permissions inheritance for E:\Marketing Data and E:\Sales Data and convert the existing permissions to explicit permissions.


2. For each of the above folders, remove the Users group from the access control list (ACL).

3. Add the Marketing group to the Marketing Data folder ACL.


4. Add the Sales group to the Sales Data folder ACL.


5. Assign the groups Full Control to their respective folders.


6. Do not change any other permissions assigned to other users or groups.


Explanation

To complete this lab, use the following information:

1. Disable permissions inheritance for E:\Marketing Data and E:\Sales Data and convert the existing permissions to explicit permissions.


2. For each of the above folders, remove the Users group from the access control list (ACL).


3. Add the Marketing group to the Marketing Data folder ACL.


4. Add the Sales group to the Sales Data folder ACL.


5. Assign the groups Full Control to their respective folders.


6. Do not change any other permissions assigned to other users or groups.


Complete this lab as follows:

1. Open the Data (E:) drive. a. From the Windows taskbar, select File Explorer .


b. From the left pane, expand This PC and then select Data (E:) .


2. Disable inheritance and convert inherited permissions to explicit permissions. a. Right-click the applicable folder and then select Properties .


b. Select the Security tab.


c. Select Advanced to modify inherited permissions.


d. Select Disable inheritance to prevent inherited permissions.


e. Select Convert inherited permissions into explicit permissions on this object .


3. Remove the Users group from the access control list. a. In Permission entries, select Users .


b. Select Remove to remove the group from the access control list.


c. Select OK .

4. Add a new group to the access control list and allow full control. a. Select Edit to add a group to the access control list.


b. Select Add .


c. Enter the name of the group you want to add and then select Check Names .


d. Select OK .


e. With the newly added group selected, under the Allow column, select Full control and then select OK .


f. Select OK to close the properties dialog.


5. Repeat steps 2 - 4 to modify the permissions for the additional folder.


4.4.12 Using the Windows Command Line (Lesson Video) Transcript:

Most modern computer users interact with their operating system using a graphical user interface, or GUI. With a GUI, files, folders, and applications are represented by icons, which can be accessed using a mouse or touch screen. GUIs are great for consumers because they're easy to learn and they have safeguards that protect against accidentally breaking the system. However, tech professionals often prefer using the command line interface for some tasks. The command line gives users a huge amount of control over the system, as well as access to some tools and software that can't be run from a GUI. Additionally, with a little practice, working from the command line is much faster than using a mouse. In this video, we'll learn how to do some simple operations on the Windows command line. Some of the commands we'll see here are different than commands we'd use on a Mac or Linux machine, but the ideas are the same.

One way to use the command line is to open a Windows Command Prompt. We'll click into the search bar, type cmd, and press enter. Since the Command Prompt provides a limited set of commands, Windows system administrators prefer the Windows PowerShell. It's a much more powerful command line that's comparable to what you might use on a Linux system.

To open Windows PowerShell, search for it in the search bar. The first thing we see here, after the copyright information, is called the current working directory. Right now, we're in the sdecker directory, which is inside the Users directory, which is on the C drive. If we type dir and press enter, the computer displays a list of all the contents of the working directory. This is the same as opening File Explorer and navigating to the sdecker folder.

Now, let's navigate to the desktop. We'll do this by typing the command cd, which stands for change directory. Then, we'll type Desktop. When we press Enter, our working directory has changed to c, users, sdecker, desktop. If we want to go back to the sdecker directory, we can type cd dot dot. These two dots are a shorthand way of saying "return to the parent directory." When we press enter, we go back up to sdecker.

On the desktop, we have a folder called planets. If we open it in File Explorer, we can see that it contains eight planets and one dwarf planet – sorry, Pluto. Let's fix this with the command line. First, let's change directories to the desktop. If we start typing and press tab, the command line fills in the rest for us – this is a huge time saver. From here, we can use the md, or make directory, command to create a new directory called Dwarf Planets.

Next, we want to copy the Pluto file into this new directory. Let's cd into Planets, then use dir to see its contents. To copy a file, we'll type the copy command, then the name of the file we want to copy. Finally, we'll type the destination of the new file. Remember, these two dots are a shortcut for going back to the parent directory, which in this case is the desktop. To finish, press enter.

Finally, we want to delete the Pluto file from the Planets directory. All we have to do is type the del command, then the filename.

If we open the two folders in File Explorer, we can see that Pluto is in the Dwarf Planets folder where it belongs.

In this video, we took a first look at the Windows command line. We learned how to navigate the file system, create new directories, copy files, and delete files.

4.4.13 Use Windows PowerShell Commands (Demo Video) Transcript:

In this lab, you'll use Windows PowerShell to perform a variety of tasks on a Windows 10 computer. Right-click Start, then click Windows PowerShell Admin. To change to the E drive, type E colon and press Enter. From here, we can use the dir command to view the directories or folders on this drive. Right now, the drive is empty. Let's create a folder by using the md, or make directory, command, followed by the name of the new folder.

Next, let's type D colon to change to the D drive. Once again, we'll use dir to view the folders on this drive. Let's navigate to the Graphics folder within the D drive. Type cd for change directory, then the name of the folder. Once we start typing, we can use tab to fill in the rest. We can use dir again to view the contents of this folder.

From here, we want to copy the cat photo into the new Graphics folder we created on the E drive. We start by typing the word copy. Then, we type the file we want to copy. Finally, we type the location we want to copy to. Let's navigate to the E drive to make sure the image was copied successfully.

Next, let's run the check disk utility on the D drive. Check disk scans a hard drive and looks for problems, then attempts to fix them. Fortunately, we didn't find any problems on the D drive.

Next, let's use PowerShell to kill a task. We'll start by opening the task manager. Right-click Start, then click Task Manager. If we click the Details tab, we can see the Process ID of each running process. Let's use the ID of the Language Application to kill the task in PowerShell. We'll type the taskkill command, space, then forwardslash pid, space then the ID number. When we press enter, the language application stops and is removed from the list of processes.

Finally, we'll map a folder on a remote computer as a drive on this computer. First, we'll switch to the root drive, which on this computer is the C drive. Then, we'll type net use space P colon space backslash backslash Corpfiles backslash personnel. When we press enter, the remote folder is mapped to our P drive. If we switch to the new drive, we can use dir to view its contents.

4.4.14 Use Windows PowerShell Commands (Simulation) Scenario

In this lab, you'll explore the file system using system commands in Windows PowerShell. Your task is to complete the following:

• Open a Windows PowerShell (Admin) window.


• Change to the E: drive.


• Use dir or ls to view the folders on the E: drive.


• Answer question 1: Which folders are on the E: drive?


• Use md to create a folder called Graphics on the E: drive.


• Change to the D: drive.


• Answer question 2: Which folders are on the D: drive?


• Use cd to change into the Graphics folder.


• Use copy to copy cat.jpg to the E:\Graphics folder.


• Change back to the E: drive and verify that the cat.jpg file was copied.


• Use chkdsk D: to check the file system on the D: Data volume.


• Use Task Manager to identify the process ID (PID) for the Language Application, then use taskkill /pid #### to stop that process.


• From the root (C: drive), use net use P: \\CorpFiles\Personnel to map the P: drive to the Personnel shared folder on

CorpFiles.


• Change to the P: drive and look at the folders on the drive.


• Answer question 3: Which folders does the P: drive contain?


Explanation

In this lab, your task is to complete the following:

• Open a Windows PowerShell (Admin) window.


• Change to the E: drive.


• Use dir or ls to view the folders on the E: drive.


• Answer question 1: Which folders are on the E: drive?


• Use md to create a folder called Graphics on the E: drive.


• Change to the D: drive.


• Answer question 2: Which folders are on the D: drive?


• Use cd to change into the Graphics folder.


• Use copy to copy cat.jpg to the E:\Graphics folder.


• Change back to the E: drive and verify that the cat.jpg file was copied.


• Use chkdsk D: to check the file system on the D: Data volume.


• Use Task Manager to identify the process ID (PID) for the Language Application, then use taskkill /pid #### to stop that process.


• From the root, use net use P: \\CorpFiles\Personnel to map the P: drive to the Personnel shared folder on CorpFiles.


• Change to the P: drive and look at the folders on the drive.


• Answer question 3: Which folders does the P: drive contain?


Complete this lab as follows:

1. Right-click Start and select Windows PowerShell (Admin) .


2. At the prompt, enter E: and press Enter .


3. Enter dir or ls and press Enter to view the folders.


4. Answer question 1: There are no folders on the E: drive.


5. Enter md Graphics and press Enter .


6. Enter D: and press Enter .

7. Enter dir or ls and press Enter to view the folders.


8. Answer question 2: The D: drive contains the Finances, Graphics, and Software folders.


9. Enter cd Graphics and press Enter .


10. Enter copy cat.jpg E:\Graphics and press Enter .


11. Enter E: and press Enter .


12. Enter cd Graphics and press Enter .


13. Enter dir and press Enter .


14. Enter chkdsk D: and press Enter .


15. Right-click Start and select Task Manager .


16. Select the Details tab.


17. Find the PID for Language Application.


18. At the prompt, enter taskkill /pid #### and press Enter . Notice that Language Application was removed from the Task Manager window.


19. Enter C: to return to the root.


20. Enter net use P: \\CorpFiles\Personnel and press Enter .


21. Enter P: and press Enter .


22. Enter dir and press Enter .


23. Answer question 3: The P: drive contains the Employee Actions, Employee Investigations, and Employee Reviews folders.


4.4.15 Use Linux Shell Commands (Demo Video) Transcript:

In this lab, we'll use the Linux command line to do some basic file management tasks. This is the default command line used by Linux and Mac systems, and it can also be installed on Windows. First, let's look at the files in the current working directory. We do this with the ls, or list, command. Right now, this directory contains two things – a file, called old_myfile.txt, and a directory called practice.

Like many Linux commands, ls has several optional switches that give it additional functionality. For example, if we use the -l switch, we get details about the files like their permissions, who created them, and when they were last modified. The first thing we want to do is delete the file. We do that with the rm, or remove, command. Type rm, then the name of the file. To be faster, you can start typing the name of the file, then press tab to fill in the rest. When we press enter, it will ask us to confirm the delete. Type y, meaning yes, and press enter. If we run ls again, we can see that the practice directory is still there, but the file is gone.

Next, we'll add a new file with the touch command. Type touch, then the name of the file, including the extension. When we press enter, the file is created. We can view it with another ls.

We can also use the command line to add text to the file. We'll do it using vi, which is the built-in visual editor. Type vi, then the name of the file. Once again, we can use Tab to fill in the rest of the filename. This brings us to the editor,

where we can see our blank document. Right now we're in the editor's command mode, where we can do things like save the file. To get into insert mode, press i. Now that we're in insert mode, we can type directly into the file. To go back to command mode, press Escape. to save the file, type :wq. This stands for write and quit.

Finally, let's copy our new file to a new directory. If we type ls, we can see that there's a directory called practice inside our current directory. To copy our file, we'll type cp for copy, then the name of the file, then the name of the directory. When we press enter, the file is copied over.

To verify that the operation worked, let's change into the Practice directory. Type cd, for change directory, then type practice. Once again, we can use Tab to finish the typing for us. Now that we're in the practice directory, we can type ls and see our new file.

4.4.16 Use Linux Shell Commands (Simulation) Scenario

In this simulation, you use the Linux commands touch, vi, cp, cd, ls, and rm to manage files from the command line. You are currently in the mbrown home directory.

In this lab, your task is to:

1. Delete a file as follows: a. At the prompt, type ls and press Enter to see a listing of the files in the directory.


b. Type rm old_myfile.txt and press Enter .


c. Type Y to remove the file old_myfile.txt.


d. Type ls and press Enter to see that old_myfile.txt is removed from the directory.


2. Add a file as follows: a. Type touch new_myfile.txt and press Enter to create a new file in the mbrown home directory.


b. Type ls and press Enter to see that the file new_myfile.txt is created.


3. Add a line to a file as follows: a. Type vi new_myfile.txt and press Enter to use the vi editor to open the file new_myfile.txt for editing.


b. Press the i key to enter insert mode in vi.


c. Type New line for new_myfile.txt .


d. Press the ESC key.


e. Type :wq and press Enter to save and exit the file.


4. Copy a file to a different directory and rename it as follows: a. Type cp new_myfile.txt /home/mbrown/practice and press Enter to copy the file new_myfile.txt to the practice directory.


b. Type cd /home/mbrown/practice and press Enter to move to the practice directory.


c. Type ls and press Enter to see that new_myfile.txt is in the /home/mbrown/practice directory.

Explanation

Complete this lab as follows:

1. Delete a file as follows: a. At the prompt, type ls and press Enter to see a listing of the files in the directory.


b. Type rm old_myfile.txt and press Enter .


c. Type Y to remove the file old_myfile.txt.


d. Type ls and press Enter to see that the file old_myfile.txt is removed from the directory.


2. Add a file as follows: a. Type touch new_myfile.txt and press Enter to create a new file in the mbrown home directory.


b. Type ls and press Enter to see that the file new_myfile.txt is created.


3. Add a line to a file as follows: a. Type vi new_myfile.txt and press Enter to use the vi editor to open the file new_myfile.txt for editing.


b. Press the i key to enter insert mode in vi.


c. Type New line for new_myfile.txt .


d. Press the ESC key.


e. Type :wq and press Enter to save and exit the file.


4. Copy a file to a different directory and rename it as follows: a. Type cp new_myfile.txt /home/mbrown/practice and press Enter to copy the file new_myfile.txt to the practice directory.


b. Type cd /home/mbrown/practice and press Enter to move to the practice directory.


c. Type ls and press Enter to see that the file new_myfile.txt is in the /home/mbrown/practice directory.


4.4.17 Section Quiz (Section Quiz) q_itf_fileman_executables

.exe, .msi, .app, .bat, .cmd, .vbs, .js, and .ps1 extensions are examples of what kind of files? Answers:

• *Executable files

• Text files


• Video files


• Music files


Explanation:

Executable files contain code that can make changes to the computer system. Make sure you know each type of executable file extension. To run an executable file, you must have administrator-level user rights.

A text file will have one of the following extensions: txt, rtf, odf, doc/docx.

A video file will have one of the following extensions: mpg, mp4, flv, wmv, avi. A music file will have the following extensions: mp3, aac, m$a, flac, wav. q_itf_fileman_facts_01

If you select a file on your desktop and delete it, what happens to the file? Answers:

• *It is moved to the Recycle bin.


• It is immediately deleted and removed from the storage media.


• It is moved to the Recycle bin and deleted later.


• Its filename is removed and it is deleted later.


Explanation:

Deleted files are sent to the Recycle bin. From there, they can either be restored to their original location or permanently removed from the computer.

Deleted files are never immediately deleted or removed from the storage media (such as a hard drive). Deleted files remain in the Recycle bin until you decide what to do with them (such as removing the file). The filename remains and the file is moved to the Recycle bin for you to decide what to do with it.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_fileman_facts_02

Designations at the end of file names such as .docx and .html are called         . Answers:

• *File extensions


• File permissions


• File properties


• File domains


Explanation:

They are called file extensions. File extensions tell the operating system how it should treat the file and which application should be used to open it.

File permissions are the rights a user has to manage a file (such as view, copy, move, or delete). They are not part of the filename.

File properties can be accessed by right-clicking the file and selecting Properties. Properties provide information about the file such as size and sharing rights. Properties are not designated in the filename.

A domain is a group of computers that can be accessed and administered with a common set of rules. Domains are not associated with a filename.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_fileman_facts_03

Which permission option lets a user view files but not change them? Answers:

• *Read


• Read/Write


• Administrator


• Owner


Explanation:

Read/Write, Administrator, and Owner roles all have permission to change files. Read or Read Only roles let users view the data but not change it.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_fileman_facts_04

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

Answers:

• *Modify


• Full Control


• Read


• Read & Execute


Explanation:

Modify provides the ability to view and change a file and file properties. Additionally, this includes the ability to add or delete files from a folder.

Full Control allows permissions to be modified.

Read only allows a file to be viewed and not changed.

Read & Execute only allow a file to be viewed and launched. q_itf_fileman_facts_05

The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?

Answers:

• *Network share


• Sharing local folders


• Shared external drive


• Database

A shared folder on the network is the best option for the department to collaborate on the files. Sharing locally would be problematic if someone's system was powered off.

Sharing an external drive is also problematic if the user's system is not available. A database does not work well for the data mentioned, such as spreadsheets. q_itf_fileman_facts_06

Which of the following operating systems require a file extension to execute a program? Answers:

• *Windows


• Linux


• MAC OS


• Android


Explanation:

The Windows operating system requires executables to have a file extension such as .com or .exe in order to execute a program.

Linux, MAC OS, and Android do not require file extensions for executable files. q_itf_fileman_folder

Caitlin has saved a bluehill.jpg file in a Vacation subfolder on the internal C: hard drive of her Windows 10 laptop. Which of the following is a valid path to the subfolder and file?

Answers:

• C:/photos/Vacation/bluehill.jpg


• C:Caitlin\photos\Vacation\bluehill.jpg


• C:\photos\Vacation/bluehill.jpg


• *C:\Caitlin\photos\Vacation\bluehill.jpg


Explanation:

C:\Caitlin\photos\Vacation\bluehill.jpg provides a valid path using backslashes to indicate subfolders (\Caitlin\photos\Vacation) and a final path to the file (\bluehill.jpg).

C:/photos/Vacation/bluehill.jpg includes forward slashes to indicate subfolders and files. Forward slashes are used in a Linux files ystem, not a Windows filesystem.

C:Caitlin\photos\Vacation\bluehill.jpg is missing a backslash in front of Caitlin to indicate a subfolder. C:\photos\Vacation/bluehill.jpg is using a forward slash to indicate a bluehill.jpg file is stored in the Vacation subfolder. Backslashes are used for both subfolders and files in a Windows file path.

q_itf_fileman_ntfs

Which of the following is available in Windows to provide usage restrictions for data files? Answers:

• Windows Registry


• Settings App


• Disk Management


• *NTFS Permissions

You can use NTFS Permissions (a form of usage restrictions) to help control the users who can read, write, move, or delete each file.

The Windows Registry is a database that stores settings for the operating system and other programs, but does not provide the ability to impose usage restrictions on data files.

In Windows 10, the Settings app customizes how the computer looks and functions, but does not provide the ability to impose usage restrictions on data files.

Disk Management is an application in Windows that helps you to perform tasks such as partitioning a hard drive or changing the file system on a drive. It does not provide the ability to impose usage restrictions on data files. q_itf_fileman_type

Jacob, a system manager, is performing tasks in a command line interface and wants to access the "/usr/local/share/blueskies.bmp" file. Which file system and file type is he trying to access?

Answers:

• *Jacob is using a Linux operating system; the file type is an image file.


• Jacob is using a Linux operating system; the file type is an audio file.


• Jacob is using a Windows operating system; the file type is an image file.


• Jacob is using a Windows operating system; the file type is an audio file.


Explanation:

Linux uses the forward slash (/) as a directory (folder) delimiter. Windows uses the back slash (\). A .bmp file is an image file format. This means that Jacob is using a Linux operating system, and blueskies.bmp is an image file.

Linux uses the forward slash (/) as a directory (folder) delimiter. A .bmp file is an image file, not an audio file. Windows uses the back slash (\) as a directory (folder) delimiter. Linux uses the forward slash (/). This means that Jacob is using a Linux operating system even though blueskies.bmp is an image file.

Windows uses the back slash (\) as a directory (folder) delimiter. Linux uses the forward slash (/). This means that Jacob is using a Linux operating system, and blueskies.bmp• is an image file (not an audio file).

q_itf_fileman_user

The Windows operating system provides several default system folders, including Windows, Program Files, and Users. Which of the following BEST describes why a Windows application would store its user-created files in a Users folder instead of its application folder (under Program Files)?

Answers:

• To make sure that file names and file paths are kept secure.


• To make sure that file names and file paths attributes are consistent.


• To allow executable application files to have a file extension such as .com or .exe.


• *To keep users from accessing and modifying its application files.


Explanation:

Security access controls allow operating systems to separate application files from user data files to prevent users from modifying the application files.

A file name and a file path are the two basic attributes of a file that uniquely identify it from other files in the same system. Maintaining consistency in file names and paths has little to do with where files are stored.

To keep information organized, files can be sorted into different folders. This feature does not explain why application files are normally separated from user data files.

While Windows requires executable files to have a file extension such as .com or .exe, this requirement does not limit executable files from being stored in any folder in the Windows file system.

q_itf2_ntfspermissions_01

What type of file system is NTFS? Answers:

• *Journaling


• Soft updates


• Log-structured


• Copy-on-write


Explanation:

New Technology File System (NTFS) is a journaling file system. This technology provides a way for system changes to be written to a log before being made, allowing the file system to revert to previous versions of permissions if needed. Soft updates is a file system used in some Unix file system implementations but not NTFS.

A log-structured file system uses log files instead of a journaling system. It is not used by NTFS. Copy-on-write is a resource-management technique used in computer programming but not NTFS. q_itf2_ntfspermissions_attributes

Which of the following is composed of a file's name; the date it was created; its size; whether the file is read-only, hidden, a system file, or an archive file; and who is allowed to see, edit, compress, and encrypt the file?

Answers:

• *File attributes and permissions


• File system


• Partition system


• Access control


Explanation:

A file has many attributes beside its name. Modern operating systems and file systems add attributes like date and time created; files size; who can open, modify, and execute the file; and attributes users can modify through markers.

Certain file systems dictate how many attributes can be given to a file or folder. For instance, NTFS includes compression and encryption. Some older file systems, such as FAT32, do not include user permissions.

Partition systems do not set file system attributes or permissions.

Access controls are part of permissions, but there is more to a file's or folder's attributes then access permissions.

4.5 Application Software Section Introduction

As you study this section, keep the following questions in mind:

• How can software applications increase your productivity at home or at the office?


• What software applications can assist you in collaborating with other people?


• What makes a slideshow effective? What makes a slideshow ineffective?


This section introduces you to various categories of application software and gives you practice managing Windows applications. After finishing this section, you should be able to:

• Identify application software that increases personal productivity.


• Identify application software that facilitates collaboration.

• Identify some common business application software.


• Run Windows applications.


• Pin applications to the Start menu and the taskbar.


• Unpin applications from the Start menu and the taskbar.


• Create application shortcuts on the Windows desktop.


• Explain how app stores are used to distribute application software.


• Open, modify, and save a Microsoft Word document.


• Open, modify, and run a Microsoft PowerPoint slide show.


Key terms for this section include the following:

Term Definition


Productivity Software

Software that is used to perform common tasks in a business or home office such as word processing, spreadsheets, presentations, web browsing, and visual diagramming.


Collaboration Software

Software that facilitates the sharing, processing, and management of files, documents and other data between members of a team. This software includes message boards, screen sharing, conferencing software, email, calendaring, instant messaging, text messaging, and online workspace and document sharing.


Business Software

Software designed for advanced or specialized business functions such as database management, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer aided design.


Netiquette

The rules of etiquette that should be observed while using computer networks, such as the internet.


Windows Application

A traditional desktop application or program.


Windows 10 App

A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.


App Store

A platform that allows users to search for a variety of apps that can be delivered to many different devices. Most apps in app stores can be downloaded for free while others must be purchased.


4.5.1 Productivity Software (Lesson Video) Transcript:

Productivity software is used to perform common tasks in a business or home office. Software applications make it easy to write a report, perform a budget analysis, prepare a business presentation, and conduct online research.

Microsoft Office, including Word, Excel, and PowerPoint, is the most widely-used office productivity software. Other popular suites include OpenOffice and LibreOffice, which are free open source solutions, and Google's G-Suite, which used to be called Google Apps. One of the reasons people like to use an integrated office application suite is that they have a common user interface and make it easy to share data between applications.

Word processors store, manipulate, and format text. Most of the things we read, like books, newspapers, and web articles, were first written in a word processor.

A spreadsheet is an application where data is organized into rows and columns. They can be used to store and organize information, as well as perform complex calculations. Spreadsheets can also create charts and graphs, which are useful for making sense of your data.

Slideshow presentations are most commonly used as a visual supplement for a verbal presentation. They help highlight the speaker's most important points and illustrate difficult concepts. They're also a great way to share visual media, such as pictures and videos, with a large audience.

When they're used for online research and for building relationships with business customers, web browsers are also considered productivity software. The most popular browsers include Google Chrome, Mozilla Firefox, and Apple Safari. Most web browsers are free to download and install on your computer.

Productivity software also includes visual diagramming tools that help you create flowcharts and other graphical representations of ideas. Most word processing and presentation software includes built-in visual diagramming tools. For more shapes and diagram templates, you can use a dedicated visual diagramming tool such as Microsoft Visio or Google Drawings.

Cloud-based productivity software such as Google's G-Suite and Microsoft Office Online run inside a web browser. These web applications allow online collaborative editing. This means multiple users can work on the same document, presentation, or spreadsheet at the same time.

Knowing how to use productivity software such as word processors, spreadsheets, presentations, and web browsers is essential for being effective in business office settings. These skills are also extremely helpful for school and for personal projects.

4.5.2 Productivity Software Facts

Productivity software is used to perform common tasks in a business or home office. Software applications make it easy to write a report, perform a budget analysis, prepare a business presentation, and conduct online research.

Table 1: Productivity Software SOFTWARE

DESCRIPTION


Office Application Suites

Microsoft Office, including Word, Excel, and PowerPoint, is the most widely-used office productivity software. Other popular suites include OpenOffice and LibreOffice, which are free open source solutions, and Google’s G-Suite, which is a paid service. One of the reasons people like to use an integrated office application suite is that they have a common user interface and make it easy to share data between applications.


Word Processing

Word processors store, manipulate, and format text. Most of the things we read, like books, newspapers, and web articles, were first written in a word processor.


Spreadsheets

A spreadsheet is an application where data is organized into rows and columns. They can be used to store and organize information, as well as perform complex calculations. Spreadsheets can also create charts and graphs, which are useful for making sense of data.


Presentations

Slideshow presentations are most commonly used as a visual supplement for a verbal presentation. They help highlight the speaker's most important points and illustrate difficult

concepts. They're also a great way to share visual media, such as pictures and videos, with a large audience.


Web Browsers

When web browsers are used for online research and for building relationships with business customers, they are also considered productivity software. The most popular browsers include Google Chrome, Mozilla Firefox, and Apple Safari. Most web browsers are free to download and install on a computer.


Visual Diagramming

Visual diagramming tools help create flowcharts and other graphical representations of ideas. Most word processing and presentation software includes built-in visual diagramming tools. For more shapes and diagram templates, you can use a dedicated visual diagramming tool such as Microsoft Visio or Google Drawings.


Cloud-Based Options

Cloud-based productivity software such as Google’s G-Suite and Microsoft Office Online run inside a web browser. These web applications allow online collaborative editing. This means multiple users can work on the same document, presentation, or spreadsheet at the same time.


4.5.3 Collaboration Software (Lesson Video) Transcript:

We've all heard the sayings and inspirational quotes about working together to accomplish more. Every organization, team, and group wants to make plans and follow through with them, but sometimes it's a bit difficult getting everyone on the same page. Fortunately, modern technology makes it easier than ever to work together. In this video we'll learn about application software that facilitates collaboration.

Message boards or discussion forums are online sites where people can hold discussions on various topics by posting messages. Topics can vary greatly, from how to fix a computer to the latest news on your favorite TV show.

Conversations happen in "threads," where one person posts a message or question, then other users respond to it. Since discussions on these boards are done asynchronously, they're also a great way to brainstorm ideas without having to set up a meeting.

Screen sharing allows you to show your computer screen to people on other computers. Which means if you are having computer trouble and the person helping you needs to look at your screen, you don't have to wait for them to come to your desk. Applications that allow screen sharing include Skype, Chrome Remote Desktop, and HipChat.

Webinars and other conferencing software allow you to connect with people through video, voice, and chat. Also known as web casts or web conferencing, webinars may be used for meetings, lectures, presentations, or training events that need to reach large audiences at remote locations.

Although we've seen a rise in various forms of digital communication, email remains the most popular. Short for electronic mail, email is much like sending a letter or note through the post, except that it's delivered electronically. All you have to do is write a message, add the recipient's email address, and click send. In addition to its speed, email has other benefits over traditional mail. You can send files, and you can send a single message to many recipients. There are two types of email systems: webmail and desktop clients. Webmail, such as Gmail and Yahoo! mail, are accessed through a web browser. Email clients, such as Microsoft Outlook, run as separate applications on your computer.

Online calendars are an excellent way to coordinate the schedules of each member on a team. Usually, everyone on the team has an individual calendar, where they can mark when they're busy or available. That way, it's easy to see when everyone is available to have a meeting or when a team member should be left alone.

Instant messaging is exactly what its names implies – a way to send messages that are instantly presented to the recipient. Most conversations on instant messaging happen in real time and can include two or more people. Skype, Google Hangouts, and Facebook Messenger are all instant messaging services. Instant messaging is a popular form of social interaction, as well as a useful tool in the business world.

Texting, sometimes called Short Messaging Service or SMS, is similar to instant messaging because communication is done through short messages. The main difference is that text messaging is handled through your phone service, and instant messaging uses the Internet. Generally, texting is done on cell phones. A similar service is MMS, Multimedia Message Service, which allows pictures and videos to be sent in text messages.

Writing is most effective when it's a collaborative process. When additional people edit written work, the result is easier to understand and more complete. Cloud-based solutions such as Microsoft Office 365 and Google's G-Suite provide an online workspace. Because documents are stored and accessed online, they can support collaborative editing, where multiple users work simultaneously on a document. Online workspaces are a great way to share documents; make, track, and control revisions; and provide feedback about documents.

In this video we discussed how easy it is to work together through technology and collaboration tools. We discussed using message boards, screen sharing, webinars, email and calendaring, instant messaging, and collaborative editing through online workspaces.

4.5.4 Collaboration Software Facts

Modern technology makes it easier than ever for people and organizations to work together and collaborate to get jobs done.

This lesson covers the topics if collaboration software. Folder Permissions

The following table describes various types of collaboration software. Table 1: Collaboration Software

Software Description


Message boards

Message boards or discussion forums are online sites where people can hold


Screen sharing Screen sharing allo


Conferencing

Webinars and other conferencing software allow you to connect with people through


Email

Although there has been a rise in various forms of digital communication, email


Calendaring

Online calendars are an excellent way to coordinate the schedules of each member on


Instant messaging (IM)

Instant messaging is exactly what its names implies: a way to send messages that are

Text messaging

Text messaging, sometimes called Short Messaging Service (SMS) or texting, is


Online workspace & Cloud


Video teleconferencing

As technology has developed, it has become more and more common to have


Remote Desktop

There are times when you would like to access a computer remotely, maybe you are


4.5.5 Business Software (Lesson Video) Transcript:

Productivity software such as Microsoft Office can be used effectively for a variety of business tasks, such as writing financial reports, preparing sales presentations, and performing budget analysis. But most businesses need additional software designed for more advanced or specialized business functions. Software designed specifically for large organizations is often called enterprise software. In this video, we'll introduce a few of the most common types of business software.

A database is an electronic repository of information. With a database management system, businesses can store huge amounts of data about their employees, customers, and product inventory. Database administrators can create queries, which pull specific information out of the database. Databases are one of the best ways for businesses to store, analyze, and interpret large amounts of data. Microsoft Access is a database management system that ships with Microsoft Office. More robust business database solutions include Oracle and Microsoft SQL Server.

Resource management software allows businesses to manage projects through technology. Applications like Trello, Jira, and Workfront allow teams to divide up big projects into smaller, manageable tasks. These tasks can be assigned to individuals within an organization along with due dates, detailed instructions, uploaded files, and any other pertinent information to get the task done. This is a great way to facilitate communication and collaboration.

With customer relationship management, or CRM, software, organizations can store and analyze relevant customer data. This includes tracking phone calls and other interactions, identifying and retaining top customers, responding to customer complaints, and making the sales process more efficient.

A spreadsheet program such as Microsoft Excel can perform basic accounting functions. For a more complete accounting solution, a small business might purchase a tool like Intuit QuickBooks. Business accounting software makes it easier to process payroll, reconcile accounts, send invoices, and track expenses. These tools streamline financial management by automating time-consuming tasks.

To create high-quality reports, magazines, and books, businesses use desktop publishing software such as Adobe InDesign or Microsoft Publisher. While word processors can perform simple document layout functions, they can't handle more complex editorial projects. Desktop publishing software can be used to create printed documents as well as digital publications such as e-books and interactive web content.

Graphic designers use software such as Adobe Photoshop and Illustrator to create visually appealing content. They combine fonts, color, photos, and illustrations to communicate a message to customers.

Engineering and architecture firms make use of Computer-Aided Design or CAD tools, which are designed for 3D modeling and simulation. CAD software allows design engineers to test prototypes before they're manufactured.

Computer-Aided Manufacturing, or CAM, refers to the process of loading CAD drawings into a machine that automates the manufacturing process.

In this video we introduced several categories of business software, including databases, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer-aided design. These software applications help businesses manage their finances, increase sales, and improve productivity.

4.5.6 Business Software Facts

Productivity software such as Microsoft Office can be used effectively for a variety of business tasks, such as writing financial reports, preparing sales presentations, and performing budget analysis. However, most businesses need additional software designed for more advanced or specialized business functions.

This lesson covers the topics of enterprise software. Enterprise Software

Software designed specifically for large organizations is often called enterprise software. The following table describes type of enterprise software.

Table 1: Enterprise Software Enterprise

Description


Databases

A database is an electronic repository of information. With a database management


Project

Resource management software allows businesses to manage projects through


Customer

With customer relationship


Accounting

A spreadsheet program such as Microsoft Excel can perform basic accounting functions.


Desktop

To create high


Graphic Design

Graphic designers use software such as Adobe Photoshop and Illustrator to create


Computer

Engineering and architecture firms make use of computer


Commercial

Commercial software is a program that is either an off


4.5.7 App Stores

Programs on tablets and phones are generally known as apps. The selection of apps available on any given device can be expanded by using an app store. These online stores provide all kinds of content including games, productivity tools, photo-editing software, and more. Apps are organized in categories and each one has an individualized icon that acts likes a book cover. You can also look for reviews of each app from other customers on the app store or elsewhere online. What Is an App Store?

An app store is a platform that allows users to search for a variety of apps that can be delivered to many different devices. In most app stores, some apps can be downloaded for free while others much be purchased. One of the exciting things about app stores is that they're constantly updated. There's always more content for users to explore. The only limit is how quickly developers make new products.

Most major content providers, like Apple and Google, have their own app stores that specialize in delivering content to their own devices. Apps that are made available are curated by the company who runs the store. This means that before an app is released, it must undergo a review process to make sure that it's compatible with the company's devices, is of high-enough quality, and doesn't include any malicious or inappropriate content. Most app stores also carry third-party content that can be delivered to non-compatible devices.

App Distribution

All a user needs to do to download an app is create an account that links their device to the app store. Once the content has been purchased, the app will be delivered to the device that he or she linked to that account. In most cases, once you've purchased an app, it's yours to keep, meaning you can delete the app from your device and then re-download it later without accruing any additional costs. This is useful because apps take up space on your device's storage.

Another feature of app stores is that they provide updates as developers release them. These updates are often meant to fix bugs or remedy complaints that users have made about the app experience. Also, developers sometimes add additional content and features to incentivize people to keep using their product.

Updating is done through the app store itself with most providing a separate section for content and a section where you can check which apps are currently available to update. These updates are almost always included in the original purchase price.

Common App Stores

There are many different app stores competing for customers in the modern market. The following are some of the most commonly used app stores:

Apple Store


Apple App Store logo.

Apple Store is the primary content provider for Apple products like the iPad, iPhone, and MacBook computers. It links with a user's Apple ID to deliver and share content across all linked Apple devices. In addition to apps, it can also provide a variety of digital media through iTunes, including MP3s, videos, eBooks, and podcasts.

Amazon.com


Amazon.com logo.

Amazon.com not only provides physical retail products but also delivers a variety of apps to its specific devices. These include the Kindle line of products and other smart devices like Alexa. Some Amazon apps can be used on multiple platforms, like the Kindle Reader.

Google Play


Google Play logo.

Google Play (formerly Android Market) is the primary content provider for Android and Google devices. In 2012, it brought together several separate digital stores that included Google Play Books, Google Play Games, Google Play Movies & TV, and Google Play Music into a single store that offers all these apps together. It comes pre-installed on Android phones and in addition to apps it also provides access to a digital media store for music, books, movies, and more.

Microsoft Store


Microsoft Store logo.

Microsoft Store (formerly Windows Store) provides apps to computers and devices running Windows or using Microsoft technology. This includes Windows tablets and phones but also Microsoft's gaming platform, the Xbox, with all its version. When Windows 10 arrived, Microsoft merged several different digital marketplaces into one store that included

Windows Marketplace, Windows Phone Store, Xbox Music, Xbox Video, and Xbox Store. Media can be downloaded directly onto an Xbox system in the same manner as other Microsoft products.

4.5.8 Managing Desktop Applications (Lesson Video) Transcript:

Desktop applications are designed to help people accomplish some kind of task on the computer, such as writing a document, browsing the Internet, creating a presentation, or running some calculations.

In Windows 10, you can install and run either desktop applications or apps from the Windows Store. The terms app and application are used pretty much synonymously. The main difference is that Windows 10 apps are installed and maintained through the Windows Store, while applications can be downloaded from other locations and installed on the system. Apps generally look a bit different from traditional desktop applications. They use the type of interface you'd probably see on a touchscreen device.

In this video, we'll focus on traditional desktop applications, but you'll use the same techniques in working with apps. To run a desktop application, click Start and then locate the application's icon in the Start Menu. The applications shown here do not represent all of the applications that are installed on this system; they're the ones that have been either frequently used or manually pinned to the Start Menu.

To view all of the applications that are available, click All Apps. The Start Menu displays a list of all of the programs installed on this system. They're accessed using these icons. Some of them are grouped into subfolders. For example, if you click on Windows Accessories, even more icons are displayed that can be used to start various applications on this system. For example, Notepad can be started by selecting its icon.

You can search for programs from the Start Menu, as well as for email messages, files, web pages, and other information. For example, to launch Microsoft Word, enter 'word' in the search window. A list of all matching resources is displayed. We want to run Word, so we click on it. Some of the icons displayed on the Start Menu are added automatically because they are used frequently.

You can also add an application manually to the Start Menu. This is called pinning. To do this, go to All Apps, then locate the application to be added to the Start Menu. We'll right click on the icon and then click 'Pin to Start'. Word is now pinned to the Start Menu. Because it's pinned, it will always be there regardless of how frequently it's used.

You can also start applications from the taskbar. On this system, three icons were added to the Quick Launch area of the taskbar automatically when the system was installed: one for the Microsoft Edge Web Browser, one for File Explorer, and one for the Windows App Store. Now just like the Start menu, you can manually pin applications to the taskbar. To do this, locate the appropriate icon in the Start Menu. We'll right-click on it, and this time select More and then Pin to taskbar. The Word icon is added to the Quick Launch area of the taskbar. You can unpin items from the Start Menu and taskbar if you decide that you don't want them there.

Icons that start applications can also be added to the desktop. Let's create an icon that launches Word on the desktop. To do this, locate the appropriate icon in the Start Menu. Then simply click and drag the icon to the Desktop. This adds a copy of the icon that launches Word to the Desktop. It's also called a shortcut to the application.

In this lesson, we talked about desktop applications. We learned how to launch an application from the Start Menu, search for an application, pin applications to the Start Menu and the Taskbar, and add icons that start applications to the desktop.

4.5.9 Desktop Application Facts

Desktop applications are designed to help you accomplish a specific task on the computer, such as writing a document, browsing the internet, creating a presentation, or running a calculation. When one of these applications is sold or distributed in a binary form it is know as a digital product, meaning that they are intangible products that only exist in a digital form.

This lesson covers the topic of common Windows application tasks. Common Windows Application Tasks

In Windows 10, you can install and run either desktop applications or apps from the Windows Store. Be aware that:

• The terms app and application are generally used synonymously.


• The main difference is that Windows 10 apps are installed and maintained through the Windows Store. Applications can be downloaded from other locations and installed on the system.


• Apps generally look different from traditional desktop applications. Apps use the type of interface you would typically see on a touchscreen device.

Whether a desktop application from an internet site or an app from the Windows Store, the product must be in a digital form and distributed as binary data. This is known as a digital product.

• Digital products are a convenient way to obtain desktop applications or apps.


• When downloading digital products from the internet, you must use extra safeguards to ensure the digital product is legitimate and doesn't include malware.


Before you install a software application, read and follow the documentation that comes with the application. The documentation may specify the following:

• Minimum hardware and software requirements for the application.


• Best practices or settings that you can use to maximize the application's performance.


• Hardware and operating system compatibility.


• Any known issues the application may have.


It's important to ensure you have a valid license to install and use the application.

When using a desktop application or app, the data generated by that program is typically stored in the user's folder (where the user has more rights and permissions), not the application's folder. This helps protect the files in the application folder from accidently being deleted or modified.

Common tasks related to apps and applications in Windows 10 are described in the following table. Table 1: Common Windows Application Tasks

Task Description


Run applications

To run a desktop application:


Search for

You can search for an application from the Start menu by typing all or part of its name


Pin applications to

You can manually add an application to the Star


Pin applications to You can pin



Add application

You can add icon shortcuts to the desktop. Icon sho


Exiting running

There are several ways to exit a running program:


4.5.10 Use Desktop Applications (Demo Video) Transcript:

In this scenario, you're working with Microsoft Office on your desktop computer. Most of the skills we'll practice in this lab apply to all Windows applications.

First, we'll launch Microsoft Word. The easiest way to do this is to click into this search box and type the name of the application. When it appears on this list, click it.

Now, we want to open a file. For most applications, including Word, this is done by clicking File, then Open. From here, click Browse, navigate to the file, select it, and click Open.

Now that the document is open, we can make changes to it. You can do whatever you want, but I'm going to delete this nonsense and replace it with some new text of my own. Once you're done making changes, you need to save the file.

Many applications have a save icon that's shaped like a floppy disk. Another way to save files is to click File, then Save. Now we can close the application by clicking this X.

Next, we want to pin an application to the Start Menu. This will make it easier to access in the future. Like before, click here and type the application's name. Then, right-click and select "Pin to Start." If we open the start menu, we can see our pinned applications right here.

Finally, we'll make a desktop shortcut. With the start menu open, drag the Excel icon to the desktop. This creates a shortcut icon. You can tell it's a shortcut because of this small arrow. Shortcuts make it very easy to open applications – all you have to do is double-click the icon.

4.5.11 Use Desktop Applications (Simulation)

Scenario

You recently purchased a desktop computer that you will use to research and write papers for your college courses. Your computer came with a recent version of Microsoft Office pre-installed.

You are not familiar with this version of Office, so you decide to spend some time exploring it. Additionally, because you expect to use Word frequently, you want to make it easy to launch.

To complete this lab, do the following:

• Launch the Word 2019 application from the Start Menu.


• Open the file named ipsum.docx located in the Documents folder on your Computer .


• Make changes of your choosing in the document.


• Save your changes to ipsum.docx and then close the file.


• Pin the Word 2019 application to the Start Menu.


• Drag an Excel 2019 application shortcut from the Start Menu to the desktop.


Explanation

A great way to become familiar with a newer version of Microsoft Word is to open an existing file, make changes, and save them. In this lab, you do this with the ipsum.docx file.

Complete the following:

1. In the lower left corner of the screen, click Type here to search .


2. Type Word in the search box.


3. Under Best match , click Word 2019 .


4. In Word, click File > Open > This PC > ipsum.docx .


5. Make changes of your choosing to the file.


6. To save your changes, click the Save icon in the top left corner of the Word window. Alternatively, you could click File > Save .


7. To close the file, click the X icon in the top right corner of the Word window. Alternatively, you could click File > Close .


To pin the Word 2019 app to the Start Menu, do the following:

1. Click the Start button on the desktop.


2. Scroll down to Word 2019 .


3. Right-click Word 2019 and then click Pin to Start .


The app is pinned to the Start menu. You can now click the pinned icon to launch its associated application. To drag an app from the Start Menu to the desktop, do the following:

1. Click the Start button.


2. Click and drag Excel 2019 to the desktop

The shortcut is copied to the Desktop. You can now double-click the shortcut on the Desktop to launch its associated application.

4.5.12 Use Microsoft Word (Demo Video) Transcript:

In this lab, you'll open a document in Microsoft Word and make some changes. To start, click the File tab, then Open. Click This PC, then click BatArticle.docx from the Documents folder.

To change the margins, go to the Layout tab, click Margins, then click Narrow.

Next, let's change the line spacing. To select the entire document, hold the control key on your keyboard and press A. On the home tab, use this dropdown to change the line spacing to 1.0.

To change the font size of the title, click and drag the mouse across to select the text. On the home tab, use this dropdown to change the font size. We'll change the font size of the subtitle in the same way.

Next, we want to format the body text as two columns to make it look more like a newspaper. Select the text by clicking and dragging with the mouse. On the Layout tab, click Columns, then click Two.

To run the spell checker, go to the Review tab and click Spelling & Grammar. Replace this first misspelling with the top option, temporarily. These other two words are fine, so we'll ignore the suggestions. Finally, let's save the document by clicking this icon in the top left corner.

4.5.13 Use Microsoft Word (Simulation) Scenario

You finished an initial draft of a news article a few days ago. Now you need to open the saved document in Word and do some formatting and editing:

1. Open BatArticle.docx from the Documents folder on your computer.


2. Change the margins of the entire document to Narrow (0.5" on the top, bottom, left, and right).


3. Select all text in the document and change the line spacing to single-spaced.


4. Change the font size of the title ( Local Company... ) to 20


5. Change the font size of the subtitle ( Employees Say... ) to 14 .


6. Select all five body paragraphs, beginning with MAPLETON -- and ending with ...bat encounters .


7. Change the layout of these paragraphs to be in two columns, keeping the rest of the paragraphs in one column.


8. Run the spell checker and use the top suggestion to correct the first misspelling. Ignore all other spelling suggestions.


9. Save your changes to the document.


Explanation

To complete this lab, do the following:

1. Open BatArticle.docx . a. Click File > Open > This PC .


b. Under the Documents folder, select the BatArticle.docx file.


2. Change document margins to Narrow . a. Open the Layout tab.


b. In the Page Setup group, select Margins > Narrow .

3. Change line spacing for the entire document to single-spaced. a. Open the Home tab.


b. Press Ctrl + A to select all text in the document.


c. In the Paragraph group, select Line and Paragraph Spacing > 1.0 .


4. Change the font size of the title to 20. a. Place your cursor in the left margin of the title paragraph ( Local Company...

) and click to select the entire line.


b. On the Home tab, in the Font group, open the font size dropdown and select 20 .


5. Change the font size of the subtitle to 14. a. Place your cursor in the left margin of the subtitle paragraph ( Employees Say... ) and click to select the entire line.


b. On the Home tab, in the Font group, open the font size dropdown and select 14 .


6. Change the layout of the five body paragraphs to two columns. a. Place your cursor in the left margin of the first body paragraph ( MAPLETON... ).


b. Click and drag down the left margin to the last line of the document.


c. On the Layout tab, in the Page Setup group, select Columns > Two .


7. Run the spell checker and correct the misspelling of temporarily . a. On the Review tab, in the Proofing group, select Spelling & Grammar .


b. In the Proofing pane on the right, under Suggestions , select temporarily .


c. For the unrecognized spelling of Quackenbush , select Ignore All .


d. For the unrecognized spelling of Batwoman , select Ignore All .


e. Click OK .


8. Save your changes to the document. a. In the upper-left corner of the window, click the Save button.

4.5.14 Use Microsoft PowerPoint (Demo Video) Transcript:

In this lab, you'll open and modify a PowerPoint presentation. Go to the File tab and click Open. Click This PC, then click the SalesTraining file from the Documents folder.

Scroll down and click underneath the last slide. Click the bottom half of the New Slide button, then click Title and Content. Click into the title placeholder and type Sales Goals.

Next, let's change the presentation theme. On the Design tab, open this dropdown. Mouse over each theme until we find the Metropolitan theme, then click it.

Now let's change the chart type on slide 3. Select the slide, then click the chart. Click Change Chart Type, select the Bar option, click the Clustered Bar chart, then click OK.

Next, let's add a transition to the slides. On the transitions tab, click Push to apply this transition to the current slide. Then, click Apply to All.

To save the presentation, click the save icon in the top left corner.

Finally, let's run the presentation. We can do that by clicking here. Click the mouse to advance from slide to slide. At the end, click to exit the presentation.

4.5.15 Use Microsoft PowerPoint (Simulation) Scenario

You have started preparing a PowerPoint presentation for your fellow sales associates. Open the presentation file, make the following formatting changes, and then run through a slide show:

1. Open the SalesTraining.pptx file from the Documents folder on your computer.


2. Add a new Title and Content slide at the end of the presentation.


3. Add the title Sales Goals to the new slide.


4. Change the theme of the presentation to Metropolitan .


5. On slide 3, change the chart type to Clustered Bar .


6. Add a Push transition to all slides.


7. Save your changes to the presentation.


8. Run a slide show from the beginning to the end of the presentation, then exit the slide show.


Explanation

To complete this lab, do the following:

1. Open SalesTraining.pptx . a. Click File > Open > This PC .


b. Under the Documents folder, select the SalesTraining.pptx file.


2. Add a new Title and Content slide at the end of the presentation. a. In the left pane, select the sixth and last slide.


b. On the Home tab, in the Slides group, open the New Slide dropdown.


c. From the New Slide dropdown, select Title and Content .

3. Add the title Sales Goals to the new slide. a. With the new slide selected, click inside the Click to add title box in the right pane.


b. Type Sales Goals inside the box.


4. Change the theme of the presentation to Metropolitan . a. On the Design tab, in the Themes group, select the Metropolitan option.


5. On slide 3, change the chart type to Clustered Bar . a. In the left pane, click the third slide to select it.


b. Select the chart in the right pane.


c. On the Chart Tools Design tab, in the Type group, select Change Chart Type .


d. In the Change Chart Type dialog box, select Bar on the left side of the window.


e. Click OK .


6. Add a Push transition to all slides. a. In the left pane, click the first slide to select it.


b. On the Transitions tab, in the Transition to This Slide group, select the Push option.


c. In the Timing group, select Apply to All .


7. Save your changes to the presentation. a. In the upper-left corner of the window, click the Save button.


a. In the upper-left portion of the window, click the Start from Beginning button.


b. Click to advance through the slides one at a time.


c. Click one more time to exit the slide show.


8. Run a slide show from the beginning to the end of the presentation.


4.5.16 Section Quiz (Section Quiz)

q_itf_productivity_software_facts_01

Which of the following are web browsers? (Select two.) Answers:

• Microsoft Visio


• *Mozilla Firefox


• Google


• *Google Chrome


• Bing


Explanation:

Mozilla Firefox is a web browser created by Mozilla Corporation but purchased by Microsoft. Google Chrome is a web browser provided by Google.

Microsoft Visio is a visual diagramming application and not a web browser. Google is a search engine and not a web browser.

Bing is a search engine (like Google) and is provided by Microsoft. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf_productivity_software_facts_02

What is the general purpose and use of software? Answers:

• *Create information from data


• Create data from information


• Create knowledge from information


• Create data from knowledge


Explanation:

The general purpose and use of software is to create information from data. For example, a spreadsheet program takes rows and columns of data that can be converted into information, such as a bar chart showing a comparison of sales for the past few years.

q_itf_productivity_software_facts_03

Which of the following applications can be used for storing, modifying, extracting, and searching data? Answers:

• *Database software


• Conferencing software


• Presentation software


• Word processing software


Explanation:

Software that is designed for creating databases and managing the information stored in them is referred to as database software.

Webinars and other conferencing software allow you to connect with people through video, voice, and chat.

Productivity software, such as word processors and slideshow presentation programs, is used to perform common tasks in a business or home office.

q_itf_productivity_spreadsheet

Henry has started his own business. He wants to track daily and monthly sales. Which software could he use to efficiently manage data and perform formula calculations?

Answers:

• *Spreadsheet software


• Text editing software


• Database software


• Imaging software


Explanation:

A good choice for Henry is to use spreadsheet software. With it, he can organize his data in cells and apply formulas for calculations.

Text editing software is good for editing text, but it lacks the ability to organize data and apply robust formulas. Database software is great for creating input forms for customer information, but it lacks formula tools for calculating sales information.

Imaging software could help Henry make flyers and advertisements, but it would not help with sales data. q_itf_collaboration_communication

Email and instant messaging (IM) seem to be very similar. What is the major difference between the two communication systems?

Answers:

• *With instant messaging, you and the message recipient are logged into the same sever.


• With email, you and the message recipient are logged into the same server.


• With instant messaging, you and the message recipient are logged into different servers.


• Email is much faster.


Explanation:

The reason IM is considered instantaneous communication is because the two recipients are logged into the same IM server and use the same IM client software.

Email recipients do not need to be connected to the same email system or even use the same email client software. A person can use the Outlook client and send a message to a Gmail client. The message is not instantaneous.

You cannot send an IM message to a person logged into a different IM system.

Email is not faster than IM. The advantage of email is not being bound to the same communication client software. q_itf_collaboration_email

Which of the following software types would be considered collaboration software? Answers:

• *Email client software


• Project management software


• Word processing software


• Database software

An email client, such as Outlook, Groupwise, or a web-based email client like Gmail or Yahoo! Mail, are examples of collaboration software. Even though the cost of building a network and maintaining it can be high, the ability to collaborate outweighs those costs by creating a collaborative work environment.

Project management software falls under the business software umbrella. There are many project management tools on the market that provide features like time management trackers and project status tracking.

Word processing software allows you to create and edit documents. It falls under the productivity software umbrella. Database software falls under the business software umbrella. We use database software to keep information organized and searchable. An example of when a database is needed would be when you want to keep customer information organized for your private business.

q_itf_collaboration_soft_facts_01

When composing an email message, why might you want to use the Bcc field? Answers:

• *To copy the email confidentially


• To clarify the overall purpose of the message


• To include extra-long email addresses


• To include email addresses of newly hired employees


Explanation:

Bcc (Blind carbon copy) hides the contact information of people included on an email sent to multiple parties. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_collaboration_soft_facts_02

What is junk email?

Answers:

• *Unwanted, unsolicited email


• Poorly worded email drafts


• Email applications that don't function well


• Another name for webmail applications


Explanation:

Junkmail is a term for unwanted, unsolicited email. Ads, hoaxes, and scams can all be considered junkmail. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_collaboration_soft_facts_03

Which of the following digital communication media does NOT require a connection to the Internet? Answers:

• *SMS


• Discussion board


• Social network


• Video conference

SMS, or Short Message Service, is generally delivered through cellular service rather than an Internet connection. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_collaboration_soft_facts_04

Match each collaboration tool on the left to its description on the right. Answers:

• Discussion board


• Screen sharing


• Resource management


• Collaborative editing


• Calendaring


Explanation:

• Resource management software keeps track of progress and assignments for large tasks.


• Collaborative editing software allows multiple users to work on a document at the same time.


• Discussion boards are online forums where discussions consist of threads of comments responding to an original post.


• Calendaring software keeps track of people's schedules, making it easier to know when people are free or busy.


• Screen sharing software broadcasts one user's screen to other users.


Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.4. q_itf_collaboration_synchronization

Cynthia is part of a team that uses a cloud-based collaboration solution. She is editing a shared spreadsheet when she notices that other people's work is not appearing on her copy. What is the problem in this scenario?

Answers:

• *File synchronization


• File permissions


• Upload maximums


• File encryption


Explanation:

File synchronization ensures that multiple locations have the same up-to-date files. If a file is changed, the synchronization process makes sure the corresponding file at other locations is edited. Cloud-based solutions make it easier to sync, save, and secure information.

File permissions are part of a collaborative system. Cloud-based solutions do give options for setting who can read or edit documents, but this is not the issue in this scenario.

Upload maximums are another issue with cloud-based solutions. There are usually file size restrictions, especially with free services. This is not the issue in this scenario.

File encryption is another cloud-based option that adds a layer of security to your shared environment. This is not the

issue in this scenario. q_itf_business_01

Robert is looking for software that will help him organize tasks and deadlines for his marketing team projects. Which of the following software types will MOST effectively provide the tools that Robert needs?

Answers:

• Collaboration software


• *Business software


• Productivity software


• Networking software


Explanation:

Business software is designed for advanced or specialized business functions, such as database management, project management, and accounting. Project management software is what Robert needs to organize his marketing team projects.

Collaboration software facilitates the sharing, processing, and management of files, documents, and other data between team members (such as email and calendaring). Managing projects is a business software type.

While productivity software (such as word processing and spreadsheets) can be used to perform common tasks in a business or home office, it would not provide (by default) all the project management features that Robert might need. Networking software provides the functionality and protocols necessary to configure and run a network (such as TCP/IP software).

q_itf_business_02

Alice is an architect for a large design company. She spends most of her day working in a software program called AutoCAD. What do we call this type of software program?

Answers:

• *Business-specific application


• Productivity application


• Collaboration software


• Cloud-based solution


Explanation:

This type of software falls under the business software umbrella, but it has a specific industry use. Not all businesses use it, unlike databases or project management tools, which can be used by all kinds of industries.

Although Alice is productive with this software, we think of productivity software more on the side of word processors, spreadsheet software, and presentation software.

Collaboration applications include email, conferencing software, and instant messaging tools.

There may be a cloud-based version of AutoCAD Alice can use, but when we think of cloud-based solutions, we usually think of things like Google apps or Office 365.

q_itf_business_accounting_01

Hannah is the manager of a successful Thai cuisine restaurant. It's November and Hannah wants to begin reviewing salary expenses for the year. She decides to generate a payroll report for all her employees.

Which of the following types of business software could easily provide Hannah with the report she needs? Answers:

• Spreadsheet software


• Project management software

• *Business accounting software


• Database software


Explanation:

Business accounting software makes it easier to process payroll, reconcile accounts, and track expenses. This software could quickly generate the report that Hannah needs.

Spreadsheet software can perform some basic accounting functions, but most businesses use business accounting software to meet their payroll needs.

Project management software lets businesses manage projects, but it is not designed to handle payroll information or processing.

A database is an electronic repository of information. The database would need to be organized to provide payroll records and might not include all the information Hannah needs.

q_itf_business_accounting_02

After working for a large corporate company for years, Tom has decided to start his own consulting company. He has hired a few people and has a list of loyal customers. He realizes he's going to need some software tools to help him run his new company efficiently. He needs software that can process orders, do business accounting, and run his payroll. He also needs software to organize sales leads and contacts.

Which category of software should he look for? Answers:

• *Accounting and commercial software


• Database software


• Publishing software


• Project management software


Explanation:

Software that falls in the accounting and commercial area is used for purposes like accounting, order processing, and payroll. It is also used for what we call CRM, or customer relationship management. This type of software tracks sales leads and assists in marketing.

Database software is good at keeping customer information organized, but it has no accounting tools.

Publishing software encompasses things like word processing but has a stronger emphasis on creating for print. This software is good for creating advertising flyers but not for tracking customers.

Project management software is good at helping you stay on task and track deadlines, but it does not have accounting tools or lead-tracking capabilities.

q_itf_desktopapps_facts_01

What is the name of the menu in the bottom left corner of the Windows environment? Answers:

• *Start Menu


• Main Menu


• Command Prompt


• Windows Menu


Explanation:

In older versions of Windows, the Start button says the word "Start" directly on it. In newer versions, the Start menu is stylized with the Windows icon.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_desktopapps_facts_02

What is the name of the narrow strip along the bottom of the Windows environment? Answers:

• *Taskbar


• Navigation bar


• Shortcuts menu


• Toolbar


Explanation:

The taskbar is at the bottom of the screen by default but can be relocated to the sides or top of the screen. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_desktopapps_facts_03

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?

Answers:

• *Desktop


• Home Screen


• Background


• Window


Explanation:

The background area of the Windows environment is referred to as the Desktop. Many users set pictures or patterns as their desktop background.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_desktopapps_facts_04

Which of the following commands makes an application shortcut appear on the taskbar? Answers:

• *Pin to taskbar


• Stick to taskbar


• Keep on taskbar


• Show on taskbar


Explanation:

Pin to taskbar is used to make icons stay on the taskbar. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.4.

4.6 Printing

Section Introduction

As you study this section, keep the following questions in mind:

• What are the benefits and drawbacks of using a laser printer?


• What are the benefits and drawbacks of using an inkjet printer?


• How has the advent of 3D printing affected the world?


After finishing this section, you should be able to:

• Open and print a document from Microsoft Word.


• Describe Windows printing features.


• Plug in and connect a printer to a computer.


• Connect to a shared printer.


• Configure the default printer.


• Share a local printer with other users on a network.


• Describe how 3D printing works.


Key terms for this section include the following:

Term Definition


Device Drivers

Software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras.


Shared Printer

A printer that is attached to one computer but allows printing access to multiple computers and devices connected to the same network.


Print Job

A file or set of files that have been submitted to a printer.


Print Queue

A container that holds print jobs that are waiting to be sent to a printer that may be too busy to accept the print job.


Print Server

A device or computer that connects client computers to printers. Client computers send print jobs to a print server that may hold them in a print queue before forwarding them to a printer.


3D Printing

3D Printing, sometimes known as additive manufacturing, is the process of creating a three-dimensional solid object from a digital file.

4.6.1 Windows Printing Features (Lesson Video) Transcript:

Let's discuss how to connect a printer to a computer system. Before printing, you'll need to make sure that your printer is connected to the computer, turned on, and not jammed. Then you're ready to configure the operating system for printing. After a printer is physically connected to your computer, Windows 10 will almost always recognize it. In some cases, you'll need to load updated drivers on the computer so it can communicate with the printer. You need to use the correct driver for the make and model of the printer you want to connect. If Windows 10 happens to not have a driver for your printer, visit the website of your printer manufacturer, download the correct printer driver, and then install it.

In this example, the driver needed for the printer is preinstalled with Windows 10, so we don't need to install one. So we simply plug the printer into a power strip, connect one end of the USB cable to the printer, and the other end to an open USB port on the computer. We then power on the printer.

As with most USB printers, Windows 10 automatically detects the printer and makes it available for use.

At this point we open the Settings App, select Devices, and then Add a printer or scanner. When the new printer is displayed, we click Add device. Since we have more than one printer installed on our system, we can specify which one is the default printer.

The default printer is the one print jobs will be sent to unless we specify otherwise. To set the default printer, under Printers & scanners, select the printer you want and then select Set as default.

Once you've connected your system to a local printer, you can share it on the network. This allows other users on your network to send print jobs to your printer through your computer. Remember, your computer must be running for network users to send print jobs to your printer. Sharing a printer is done by scrolling to the bottom of the Printers & scanners screen and clicking Devices and printers. Now we'll right-click the printer we want to share and select Printer properties. On the Sharing tab, mark 'Share this printer' and in the 'Share name' field, enter a name for the printer. This is the printer name network users will see. Click OK.

To use the shared printer from a different computer on the network, we would follow the same steps for adding a printer that we demonstrated earlier.

To verify that this printer is working correctly, right-click and again select Printer properties. On the General tab, click 'Print Test Page'. Click Close. Since we're now connected, we can use applications on our system to send print jobs to the new printer.

In Microsoft Word, we'll open and then print this document. With the document open, click File and then Print. Under Printer, select the printer you want to send the document to. Configure any other settings, such as page orientation and paper size. Specify the number of copies, and then click Print.

Sometimes you may have to manage the print jobs as they're queued up waiting for the printer. For example, you may have accidentally sent a very large print job to the printer by mistake and need to stop it from printing. To do this, in the notification area of the Taskbar, click the printer icon. Alternatively, you can also double-click the printer in Devices and Printers in the Control Panel.

The print queue for your printer is displayed. Each print job in the queue is shown on a separate line. The jobs are shown in the order they will be printed. The first job listed will be printed first, the second job will be printed second, and so on. You can do the following with the jobs in the queue. To temporarily pause all printing without removing any of the print jobs, click Printer > Pause Printing. To cancel printing all documents, click Printer > Cancel All Documents. To pause printing on a single print job, select the job and then click Document > Pause. When you're ready to print again, you can click Document > Resume. To cancel printing a single print job, select the job and then click Document > Cancel. To restart a single job, select the job and then click Document > Restart.

In this lesson, we learned how to get a computer system ready to print. We also demonstrated how to share a printer with other users on the network, how to print from Microsoft Word, and how to manage print jobs in the queue.

4.6.2 Windows Printing Facts

This lesson covers the following topics:

• Windows printing components


• Windows print management tasks


Windows Printing Components

In order for your computer to send documents to a printer, several components are required. Image 1: Windows Printing Components

Printing process flowchart.

Table 1: Windows Printing Components Component

Description


1. Computer

The computer runs an application that sends print jobs to the printer.


2. Application

The application creates print jobs and sends them to the printer.


3. Printer driver

The printer driver is software running on the system that contains instructions to tell the


4. Connecting medium The pri


5. Printer

The printer creates the documents sent from the application.


Windows Print Management Tasks

When you print a document, the following process occurs:

1. The application sends the print job to the printer.


2. Windows stores the print job in a temporary file on the system's hard disk drive. This is called the print queue.


3. The printer driver reformats the print job so that the printer can understand and process it.


4. Windows waits for the printer to become available. The printer must be: o Turned on.


o Not jammed.


o Finished printing all other print jobs.


5. Windows moves the print job from the print queue to the printer.


6. The printer prints the document.


Several commonly used Windows printing management tasks are described in the following table: Table 2: Windows Print Management Tasks

Task Description


Connect to a

To connect a printer to a computer, do the following:


Specify the default printer

If you have more than one printer configured on your system, specify a default printer. The


Share a printer

You can share a locally


Connect to a

To connect to a shared printer over the network, complete the following steps:


Manage print

You may have to manage print jobs as they are queued up waiting for the printer. To do this,


View Printer

To view the printer's status:


4.6.3 3D Printing

3D printing, or additive manufacturing, is the process of creating a three-dimensional solid object from a digital file. This is done by using an additive process, which is where successive layers of a material are laid down until the object is created. While being created, each layer appears as a thinly sliced horizontal cross section of the final object. 3D printing uses less material than traditional manufacturing, such as subtractive manufacturing, where sections are cut out of metal or plastic slates to create the desired object.

3D Printer


3D printer.

Photo by NeONBRAND on Unsplash Today's Uses for 3D Printing

3D Printed Topography


A 3D printed terrain model of a canyon with a river flowing through. Photo by Amin Hasani on Unsplash

3D printing has paved the way for major advancements in many fields. Car manufacturers have begun using on-demand 3D printing to print parts and tools needed for cars. This has led to shortened design and production cycles.

In October of 2018, GE Aviation hit a milestone when it made its 30,000th cobalt-chrome fuel nozzles for its LEAP aircraft engines using 3D printing. The technology changed their previous manufacturing process where twenty individual parts had to be welded together. GE now saves $3 million per aircraft by 3D printing the fuel nozzles which weigh 25% less and are five times stronger.

When 3D printing is used for construction it's called contour crafting. Contour crafting is viewed as the future of construction because of the reduction in labor costs and raw materials. Contour crafting also allows for a quicker turnaround time between jobs. Since 2010, this method has been used to build bridges, sculptures, and homes in various

countries around the world.

Contour crafting can also be used for the construction of extraterrestrial structures where environmental conditions are not favorable, such as the moon. 3D printing is not a new concept when it comes to NASA. In 2014, astronauts on the International Space Station needed a new ratchet wrench. Engineers on Earth designed the wrench, then emailed the pattern to the space station, where it was printed using the onboard 3D printer. This is the first known instance of humans emailing a wrench to space.

Commander Barry "Butch" Wilmore Aboard the International Space Station


Commander Barry 'Butch' Wilmore aboard the International Space Station holding up a 3D printed wrench. Photo by NASA

3D printing has also revolutionized healthcare, bringing futuristic visions to life. Scientists have been experimenting with bioprinters, which are 3D printers that layer bio-ink with human cells to form three-dimensional tissues and organs. To create an ear, for example, the printer first creates a biodegradable, ear-shaped scaffold which is covered with the patient's skin and cartilage cells. The cells then grow to fill in the form. After about 6 months the form biodegrades, leaving only an ear composed of human cells. Since the patient's own cells are used, these organs don't run the risk of patient rejection. Bioprinters also allow scientists to create organs to test new drugs and therapies with no risks to humans.

3D printing can also be used to create implants and prosthetics by translating MRI, CT, and X-ray scans into STL files. Translating these scans into 3D print files have aided in creating prosthetic limbs as well as dental, spinal, and hip implants. Previously, surgeons had to modify the implants during the operation. 3D-printed implants now allow for an easily customized fit for each patient.

The Future of 3D Printing 3D Printer at Work


A 3D printer printing a terrain model. Photo by Amin Hasani on Unsplash

3D printing will saturate almost every industry imaginable. It will give individuals the opportunity to create clothes that fit their personal style and allow for customization of medical tools and parts. It will create cheaper housing opportunities. All of these 3D-printed solutions allow for less time and effort to achieve a result. This technological revolution is already enabling people greater freedom and creativity in their own lives with less reliance on outside entities.

4.6.4 Install and Configure a Local Printer (Demo Video) Transcript:

In this lab, you'll connect to a new shared printer. First, we'll need to tell Windows to not automatically change our default printer. Right-click Start, then click Settings. Click Devices, then Printers & scanners. By unchecking this box, Windows will stop automatically updating our default printer to be the last printer we selected.

Next, we want to add our new printer. Click Add a printer or scanner. Select the new printer, then click Add device. Finally, we want to make the new printer our default. Select the new printer, click Manage, then click Set as default.

4.6.5 Install and Configure a Local Printer (Simulation) Scenario

An HP LaserJet printer was recently shared throughout your network. You need to connect to the new shared printer and prevent Windows from changing the default printer.

In this lab, your task is to:

• Turn off Windows management of the default printer.


• Add the shared HPLaser2300 printer.


• Configure the HPLaser2300 printer as the default printer.


Explanation

Complete this lab as follows:

1. Turn off Windows management of the default printer. a. Right-click Start and then select Settings .

b. Select Devices .


c. From the left pane, select Printers & scanners .


d. Clear Let Windows manage my default printer . Notice that the Microsoft XPS Document Writer printer is set as the default.


2. Add the HPLaser2300 shared printer. a. Select Add a printer or scanner .


b. Select the HPLaser2300 on Office1 printer and then select Add device . The printer is installed and added under Printers & scanners.


3. Configure HPLaser2300 as the default printer. a. From the right pane, under Printers & scanners, select the HPLaser2300 on Office1 printer.


b. Select Manage .


c. Select Set as default .


d. Close the Settings dialog.


4.6.6 Print a Document (Demo Video) Transcript:

In this scenario, you need to use an Inkjet printer to print out a homework assignment. First, you need to make sure the correct printer is set as your default. When you want to make an adjustment to the system, you can often find the correct place by typing it into the search box. If we type "printer," we see two options. As it turns out, you can change the default printer from either of these locations. For this demonstration, we'll select Devices and Printers. Down here, we can see three printers attached to this system. To set the Canon Inkjet as the default, right-click it, then click Set as default printer.

Now that we've set the correct default printer, we can print out the homework assignment. Open File Explorer, navigate to Documents, and double-click the ipsum.docx file. As with many applications, you can print in Word by clicking File, Print. Since we want to use the default options, all we have to do from here is click the Print button.

4.6.7 Print a Document (Simulation) Scenario

You recently purchased a new Canon Inkjet printer and connected it to your desktop computer system, using a USB cable. You now need to use your new printer to print a homework assignment for your Latin 101 class.

To complete this lab, you need to do the following:

• Configure the Canon Inkjet printer to be the default printer.


• Start Microsoft Word.


• Open the ipsum.docx file, located in the Documents folder on your Computer , in Microsoft Word.

• Print ipsum.docx on the Canon Inkjet printer, using the default printing options.


Explanation

To complete this lab, perform the following tasks:

1. Set the default printer by doing the following: a. Click the Start button and then Settings .


b. Select the Devices option.


c. On the left side of the window, select Printers & scanners .


d. Under Printers & scanners , select the Canon Inkjet printer and click Manage .


e. Under Manage your device , select Set as default .


f. Close the Settings app.


2. Open Microsoft Word by typing Word in the Type here to search box. Under Best match , select Word 2019 .


3. Open ipsum.docx by doing the following: a. Click File > Open > This PC .


b. Under the Documents folder, select the ipsum.docx file.


4. Print ipsum.docx by doing the following: a. Click File > Print .


b. Under Printer , make sure that the Canon Inkjet printer is selected.


c. Leave all other print settings at their default values.


d. Click Print .


4.6.8 Section Quiz (Section Quiz) q_itf_winprinting_01

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?

Answers:

• Restart Windows


• Power cycle the printer


• Reset the USB cable


• *Install the latest driver

Explanation:

Windows typically has a driver for most printers. But if Windows 10 happens to not have a driver for your printer, visit the website of the printer's manufacturer, download the correct driver, and then install it.

Restarting Windows would not force it to recognize the printer.

Power cycling the printer would not help Windows recognize the printer. Resetting the USB cable would not help Windows recognize the printer. q_itf_winprinting_02

Where is the BEST place to obtain the latest printer driver? Answers:

• *Manufacturer's website


• Printer reseller


• Microsoft's website


• Windows Update


Explanation:

Printer drivers should be downloaded from the manufacturer's website. This ensures that the driver being downloaded is the correct and most up-to-date version.

Going to the printer reseller is not the best option to obtain a printer driver. Microsoft's website would generally not have the latest driver for a printer. Windows Update would not be the best place to obtain the latest driver for a printer. q_itf_winprinting_03

Windows stores print jobs in a temporary file on the hard drive. What is this file called? Answers:

• Print Spooler


• Print Manager


• Print driver


• *Print queue


Explanation:

The print queue is a temporary file on the hard drive that Windows stores print jobs in until they are ready to be processed.

Print Spooler is a Windows component that helps manage print jobs.

Print Manager is a Microsoft Management Console (MMC) snap-in that enables you to install, view, and manage your printers.

The print driver reformats print jobs so that the printer can understand and process them. q_itf_winprinting_04

Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?

Answers:

• *Settings > Devices > Printers & scanners


• Control Panel > Printers and scanners


• Settings > Printers & scanners


• Control Panel > Devices > Printers & scanners

Explanation:

To set the default printer, open the Settings app and navigate to Devices > Printers & scanners. Select the appropriate printer and select Set as default.

None of the other options are correct paths to set a printer as the default printer. q_itf_winprinting_05

Janice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding.

Which of the following would be the MOST LIKELY reason for this? Answers:

• Incorrect printer driver


• *Janice has turned off her computer


• Steve is not connected to the network


• Janice is not connected to the network


Explanation:

The most likely reason for Steve not being able to print in this scenario is that Janice has turned off her computer. When a user shares a locally installed printer, their computer must remain on for other users to continue using it.

Steve was able to install and configure the printer on his computer and print a test page, so the printer driver is correct. It is unlikely that either user is no longer connected to the network.

q_itf_winprinting_06

Where would you go to cancel a print job? Answers:

• Print Spooler


• Print Manager


• Print driver


• *Print queue


Explanation:

The print queue is a temporary file on the hard drive that Windows stores print jobs in until they are ready to be processed. You can access the print queue by clicking on the printer icon in the taskbar or through the Control Panel. From the print queue, print jobs can be paused, cancelled, or restarted.

Print Spooler is a Windows component that helps manage print jobs.

Print Management is a Microsoft Management Console (MMC) snap-in that enables you to install, view, and manage your printers.

The print driver reformats print jobs so that the printer can understand and process them. q_itf_winprinting_07

Which of the following is a proper path name to a shared network printer? Answers:

• \\network_name\printer_name


• \computer_name\\printer_name


• \network_name\\printer_name

• *\\computer_name\printer_name


Explanation:

The proper network naming scheme is \\computer_name\printer_name. This is often referred to as the Universal Naming Convention (UNC).

None of the other options are correct examples of a UNC. q_itf_winprinting_08

Which component is responsible for reformatting print jobs so that the printer can understand and process them? Answers:

• Print Spooler


• Print Manager


• *Print driver


• Print queue


Explanation:

The print driver reformats print jobs so that the printer can understand and process them. Print Spooler is a Windows component that helps manage print jobs.

Print Management is a Microsoft Management Console (MMC) snap-in that enables you to install, view, and manage your printers.

The print queue is a temporary file on the hard drive that Windows stores print jobs in until they are ready to be processed.

q_itf_winprinting_device

You are troubleshooting a printer issue on a Windows 10 version 1703 system. Where would you go to view the printer's status page and configuration options?

Answers:

• Settings --> Devices


• Settings --> Printers


• *Control Panel --> Devices and Printers


• Control Panel --> Troubleshooting


Explanation:

In Windows 7 and 8 and versions of Windows 10 pre-1803, you can view a printer's status page and configuration options in the Devices and Printers applet in the Control Panel.

In Windows 10 version 1803 and newer, the printer's status page and configuration options are found in the Devices section under Settings.

Printers is not an option under the Settings app in Windows 10.

The Troubleshooting applet in Control Panel is used to access troubleshooting wizards, not to view a printer's status or configuration options.

q_itf_winprinting_printer

Jeremy has just installed a printer in his home office and wants to allow others in the home to send print jobs to the printer through their devices.

Which of the following should Jeremy use in his Windows 10 Settings application to enable this printing feature? Answers:

• Devices and Printers

• *Printer Properties


• Bluetooth & Other Devices


• Device Manager


Explanation:

Printer Properties is a dialog available for each printer that includes a Share tab with options to set up a shared printer over a network.

When you open the Settings app, elect Devices > Devices and Printers to select a printer and display the Printer Properties dialog (which allows you to share a printer). The Devices and Printers option simply displays available printers and devices available to the computer.

The Bluetooth & Other Devices option allows you to connect with a Bluetooth device and as well as other devices such as a mouse or audio device. It is not designed to configure printer sharing.

Device Manager is an application available from the Control Panel. It allows you to view and manage some settings for devices. To share a printer, you need to use the Printer Properties dialog.

q_itf2_3dprinting_01

Which of the following processes does 3D printing use? Answers:

• Digital


• *Additive


• Manual


• Subtractive


Explanation:

3D printing is the process of creating a three-dimensional solid object from a digital file using additive processes. During an additive process, successive layers of a material are laid down until the object is created.

A 3D printer uses a digital file for the printing directions. A manual process is not used in 3D printing.

Subtractive manufacturing is when a section of an object is cut out of metal or plastic. q_itf2_3dprinting_02

Which of the following is a benefit of 3D printing over traditional manufacturing? Answers:

• More precise angles


• Wider variety of materials can be used


• *Consumes less material


• Larger items can be produced


Explanation:

3D printing uses less material than traditional manufacturing.

Currently, the other options are not benefits of 3D printing over traditional manufacturing.

4.7 Software Troubleshooting Section Introduction

As you study this section, keep the following questions in mind:

• Why is resetting the computer often the first troubleshooting step for a software problem?

• What should I do when an app becomes unresponsive?


• Why is it important to keep apps up to date?


After finishing this section, you should be able to:

• Identify common steps to follow in troubleshooting software problems.


• Configure compatibility settings for Windows applications.


• Use Windows Task Manager to: o View information on running processes.


o Prevent applications from running at system startup.


o Close unresponsive apps.


• Repair a Windows program in Apps & features.


Key terms for this section include the following:

Term Definition


Software Crash

A common issue in which software stops running properly, forcing you to exit and reopen the program.


System Slowness

A common issue where the software starts running more slowly than usual and every command the computer makes may be delayed by a few seconds or longer.


System Crash

An issue in which software problems cause the system to crash completely, possibly forcing the entire system to restart. This can cause data loss.


Malicious Software Infection

A kind of software that can harm a computer and compromise security.


Task Manager

A program used by Windows to provide information about how a computer is performing and which processes and services are running at any given time.


4.7.1 Software Troubleshooting Steps

In addition to hardware problems that can cause your computer to malfunction, there are a variety of software issues that cause your computer to behave in unexpected ways. By following some basic troubleshooting steps, you can narrow down possible problems and decide what to do next. With a little experience, you can resolve most software problems yourself.

Common Software Problems

The following are issues you may encounter with your computer's software:

Software Crashes

One of the most common software problems you may encounter is a program that runs very slowly or that constantly crashes, forcing you to open the program over and over.

System Slowness

Another issue is a computer that starts running more slowly than usual. Every command your computer makes may be delayed by a few seconds or longer, making it frustrating to do almost anything.

System Crashes

Sometimes software problems cause your system to crash completely and may force your entire system to restart, which can cause data loss. You may encounter the blue screen of death (BSOD), pictured below.


System crash message screen aka the Blue Screen of Death. Screenshot. Malicious Software Infection

Malicious software is a kind of software that can harm your computer and compromise your security. Examples include computer viruses, adware, and malware. Different types of malicious software do different things, but problems can include: erasing or corrupting data, causing system crashes, and stealing personal information from the computer.


Pirate flag against red screen on a laptop representing malicious software infections. Photo by Michael Geiger on Unsplash

Troubleshooting Software Problems

If your computer software is acting strangely, the following troubleshooting steps may be helpful in fixing the problem:

• Save your work and reboot your computer.


• Try to determine which software is having the problem. Does the problem happen with just one program or with all programs? If it is with one program, it's more likely a specific software problem.


• Free up computer memory (RAM) by closing other programs you're not using. If programs are not responding, force close the programs to help free up computing power.


• Close and reopen the software.


• Undo any recent hardware or software changes. Uninstall any recently installed programs or devices and see if that solves the problem. If it does, the problem may be caused by a conflict with one of these new programs or devices.


• Uninstall the software having trouble and reinstall it. Sometimes programs aren't installed properly or have had something essential go missing since they were first installed. Reinstalling can fix both of these problems.


• Look at the software manufacturer's website to see if they have any patches for your software. These patches are updates to the program that fix known bugs and make your software run more smoothly.


• Run a scan for viruses or malware on your computer. These kinds of malicious software can cause major problems to your system. There are many kinds of antivirus and anti-malware programs that automatically scan your computer and help you delete malicious intrusions. Some of these programs cost money and some are free.


• Defragment your hard drive. If you've tried everything else, you can try defragmenting your hard drive. This rearranges the files on your hard drive so that your computer runs more efficiently. Be aware that this is only available for spinning disk drives. This process can take a long time, so allocate a few hours to let the process run.


If none of these steps have solved your problems, it may be time to look up the technical support available for that software. Make sure that you document everything you've already tried so that you don't have to duplicate your efforts with technical support.

How to Force Close a Program

To force close a program, you need to go through a different process depending on whether you're using a Windows computer or a Mac computer.

On a Windows computer, press the control key, the alt key, and the delete key at the same time. This brings up a window called Task Manager. In this window, you'll see all the processes that are currently running, categorized by the amount of RAM they're using. If a process is frozen, you'll see the words "Not Responding" in parentheses next to the name of the process.

Click on the process that you want to force quit to highlight it. Once it's highlighted, click the "End Process" button. This shuts down the process right away.

To do this on an Apple computer, you need to press the Option, Command, and Escape keys at the same time. You can also choose the option "Force Quit" from the Apple menu. This opens up the Force Quit menu. This will list all the apps that are currently running. Highlight the app you want and press the "Force Quit" button.

Verifying Your Fixes

In order to verify that your troubleshooting steps have been effective, you can take the following steps:

• Reboot the computer and makes sure it boots up normally.


• Open the software that was experiencing the issue and attempt to use it normally. Try to replicate what you were doing when you were having the problem.


• Use the computer for an extended period to make sure it doesn't slow down over time.


4.7.2 Using Task Manager

This lesson covers the following topics:

• Task Manager


• Purpose and uses of Task Manager


• Launching Task Manager


• Task Manager scheduler


Task Manager

All Microsoft Windows systems include a Task Manager that helps provide information about how the computer is performing and the software (or tasks) that are running at any given time. You can find out a variety of interesting things from Windows Task Manager, such as how much computing power each task is using and the users who are logged onto a computer. You can also use Task Manager to deal with programs that aren't responding.

Task Manager


Task Manager Performance Tab. Screenshot. Purpose and Uses of Task Manager

Windows Task Manager is especially helpful in ending processes that you don't want to be running. A process is program that can be composed of multiple threads being executed simultaneously and is allocated a portion of the system's memory.

Sometimes a program freezes or there may be too many programs running for the system to handle. Either can negatively affect your computer's performance. By closing programs, you can free up RAM so that other programs run more smoothly.

When you open Task Manager, it defaults to a list of programs or tasks that are currently in operation. Applications that are minimized in the System tray, such as any active antivirus software, won't show up on this list.

You can go to the Processes tab to see instances of specific programs that are running. Highlight a program and click End Process to stop the operation of that program. Carefully select processes to close. Some processes are vital to the functioning of your computer. Ending them can cause your system to malfunction or crash.

Task Manager Processes Tab

Task Manager Processes Tab. Screenshot.

The Services tab shows programs that are running in the background (such as antivirus software). These are programs that automatically start when the computer boots up. If a service has stopped, you can right-click it and select Start Service. Conversely, you can stop a service by right-clicking it and selecting Stop Service.

Another feature of Task Manager is the ability to see the system's network and performance statistics. These can be found under the Performance tab. There you can locate a CPU usage meter that shows current and past information in relation to the amount of CPU capacity and usage. If too much of the CPU is being used, it might be a good idea to close some programs.

You can go to the Networking tab to see similar stats on how the network is being utilized.

The Users tab shows all users who have an active session on the system. You can force a user to log off by highlighting the user's name and clicking Logoff. If you want to preserve a user's session in memory so at a later time they can continue working from where they left off, select Disconnect.

You can also use Task Manager to switch to a new program. To do this, highlight a program and select the Switch To button. You can also open programs from Task Manager by selecting New Task. You then have the option to type a new command or to click Browse to locate the command on the computer. This is the same as the Run command on the Start menu.

Launching Task Manager

There are several ways to access Windows Task Manager. The first is to press Control + Alt + Delete at the same time. This brings up a menu where you can access Task Manager. Keep in mind that if your computer is already running slowly, it may take a little while for this menu to appear.

Another way is to type Task Manager into the Windows search bar and click the Task Manager icon when it appears. You can also right-click any empty area of the taskbar and select Task Manager from the pop-up that appears.

Task Scheduler

As you work with tasks and Task Manager, you may also find a need configure when specific tasks should run. Task Scheduler is a Windows service app that is triggered by events to automatically start an application or run a script.

Some tasks that are commonly scheduled to run at regular intervals include backups, malware scans, and system updates. Triggers identify conditions that start the task. Triggers include day, time, login, and responses to other system events.

You can configure the Task Scheduler to run a program, send an email, or show a message when the trigger occurs. Tasks are stored in folders in the Task Scheduler Library. To view or perform an operation on any individual task, select the task in the Task Scheduler Library and click a command in the Action menu. Using Task Scheduler, you can view the tasks that are scheduled to run and the current status of that task. You can end tasks if needed or edit them to function in a different way.

Task Scheduler can be opened by typing "Task Scheduler" (or "taskschd.msc") in the taskbar's search box and selecting Run as administrator.


Task Scheduler screenshot.

4.7.3 Manage Applications (Demo Video) Transcript:

In this scenario, you want to configure which apps will automatically start when a Windows system turns on. To do this, open the task manager by right-clicking the start button, then clicking Task Manager. On the startup tab, select each app you don't want to start automatically when you turn on the computer turns on, then click Disable. When you're done, close the task manager.

Next, you want to configure an older program to run in Windows 8 mode. First, we'll navigate to the program. Open file explorer, then click This PC. From here, follow each step in the file path. Open the C drive, Program Files x86, AccountWizard. Right-click AccountWizard.exe and select Properties. On the Compatibility tab, check "Run this program in compatibility mode for:", then select Windows 8 from the dropdown. Check this box to run the program in 640x480 screen resolution, and check this box to run the program as an administrator. When you're done, click OK.

4.7.4 Manage Applications (Simulation) Scenario

You are the IT administrator for a small corporate network. You have several applications that should not start when the system starts up.

In addition, you have an application that needs to run on an older operating system. In this lab, your task is to complete the following on Office1:

• Use Task Manager to prevent the following applications from running at system startup: o Compy DVD Apps

o DIRE Event Monitor


o inTune


o SM66 Win32 Utility


• Configure compatibility settings for the C:\Program Files (x86)\AccountWizard\AccountWizard.exe application using the following compatibility mode settings: o Run in Windows 8 mode


o Run in 640 x 480 resolution


o Run as an administrator every time


Explanation

In this lab, your task is to complete the following on Office1:

• Use Task Manager to prevent the following applications from running at system startup: o Compy DVD Apps


o DIRE Event Monitor


o inTune


o SM66 Win32 Utility


• Configure compatibility settings for the C:\Program Files (x86)\AccountWizard\AccountWizard.exe application using the following compatibility mode settings: o Run in Windows 8 mode


o Run in 640 x 480 resolution


o Run as an administrator every time


Complete this lab as follows:

1. Prevent applications from running as follows: a. Right-click Start and select Task Manager .


b. Select Compy DVD Apps ; then select Disable .


c. Select DIRE Event Monitor ; then select Disable .


d. Select inTune ; then select Disable .


e. Select SM66 Win32 Utility ; then select Disable .

f. Close Task Manager.


2. To modify compatibility settings for an application: a. Open File Explorer .


b. Expand This PC .


c. Expand the C: drive.


d. In the left plane click Program Files (x86) .


e. In the right pane double-click AccountWizard .


f. Right-click AccountWizard.exe and select Properties .


g. Select the Compatibility tab.


h. Under Compatibility mode, select Run this program in compatibility mode for .


i. From the drop-down list, select Windows 8 .


j. Select Run in 640 x 480 screen resolution .


k. Select Run this program as an administrator .


l. Click OK .


4.7.5 Repair Programs (Demo Video) Transcript:

In this lab, you need to repair a program that hasn't been working correctly. Open the Settings app by clicking Start, then the gear icon. Click Apps. This leads us to a list of all the applications on the computer. Scroll down and select Security Evaluator. Click Modify, then click next. When the repair is done, click Finish.

4.7.6 Repair Programs (Simulation) Scenario

You are having problems with the Security Evaluator program on your computer.

In this lab, your task is use the Apps option in the Settings app to repair the Security Evaluator program. Explanation

In this lab, your task is to repair the Security Evaluator program. Complete this lab as follows:

1. Select Start .


2. Select Settings .


3. Select Apps .


4. Maximize the window for easier viewing.

5. Under Apps & features, select Security Evaluator .


6. Select Modify .


7. Click Next .


8. Click Finish .


4.7.7 Section Quiz (Section Quiz) q_itf2_sofwaretrouble_01

Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened?

Answers:

• *System crash


• Software crash


• System slowdown


• Program force-close


Explanation:

When a computer suddenly restarts and displays a blue error screen, a system crash has happened. A software crash occurs when a particular program shuts down (not the whole computer).

A system slowdown means that the computer is running slow, but it does not completely shut down. Force-closing a program is done by the user in Task Manager.

q_itf2_sofwaretrouble_02

Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause?

Answers:

• System crash


• Software crash


• System slowdown


• *Malware infection


Explanation:

Malicious software is a kind of software that can harm your computer and compromise your security. Different types of malicious software do different things, but problems can include: erased or corrupted data, system crashes, and stolen personal information.

None of the other options would generally result in documents in the User folder being deleted. q_itf2_sofwaretrouble_03

Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?

Answers:

• Safe Mode


• *Defragmentation

• Task Manager


• Program force-close


Explanation:

Defragmentation rearranges the files on a hard drive so that the computer runs more efficiently. This is only available on Windows computers.

Safe Mode is a special boot option that boots the computer with only the essential applications. Task Manager is used to view currently running programs and services in Windows.

Force-closing a program is done by the user in Task Manager. q_itf2_sofwaretrouble_04

Which of the following keys is used to enter Safe Mode on a Windows computer? Answers:

• CTRL


• F5


• *F8


• Shift


Explanation:

Safe Mode is entered on a Windows computer by pressing the F8 key as the computer is booting up.

None of the other keys enter Safe Mode on a Windows computer. Shift is used to enter Safe Mode on a Mac. q_itf2_sofwaretrouble_05

Which of the following is the first step in verifying that a problem has been fixed? Answers:

• Running a virus scan


• Opening the program


• *Rebooting the system


• Running the computer for an extended time period


Explanation:

Rebooting the computer and making sure it boots correctly is the first step in verifying that a problem has been fixed. Running a virus scan is part of the troubleshooting process. It is not something that is done to verify if a problem has been fixed.

Opening the software that was causing the problem should be the subsequent step.

Using the computer for an extended time period allows you to see if the computer slows down after continuous use. q_itf2_sofwaretrouble_06

Which of the following is used to force-close a program on an Apple computer? Answers:

• *Option, Command, Escape


• CTRL, Command, Escape


• CTRL, Command, Delete


• Option, Command, Delete

To force-close a program on an Apple computer, press the Option, Command, and Escape keys at the same time. None of the other key combinations will force-close a program on an Apple computer.

J New_Question_1

Tom notices that his hard drive is close to being full. He knows that it's important to have free disc space for file swaps. He determines that he has many old programs he is no longer using and wants to remove them from his computer. What are the steps to open the Windows Application Management tool?

Answers:

• Device Manager > Remove Programs


• Ctl-Alt-Delete > Task Manager


• *Control Panel > Programs and Features


• Start > Disk Management


Explanation:

Control Panel > Programs and Features are the correct steps to get to the Windows Application Manager. Use this utility to add and remove programs, add and remove Windows tools, and see installed updates.

Device Manager > Remove Programs does not exist.

Ctrl-Alt-Delete > Task Manager are the steps to see and close running applications.

Start > Disk Management are the steps to reach a tool to format your drives and create partitions and volumes. It has no application management tools. </P.< div>

q_itf2_taskman_01

Which Windows tool shows currently running programs and can be used to end a process? Answers:

• Apps & features


• Control Panel


• Services


• *Task Manager


Explanation:

Windows Task Manager lets you see which programs are currently running on your computer and can be especially helpful in ending processes that you do not want to be running anymore.

Apps & features allows users to manage installed programs and Windows features. Control Panel can be used to access many Windows applets.

Services allows users to manage Windows services. q_itf2_taskman_02

Which of the following key combinations lets you open Task Manager? Answers:

• CTRL, Shift, Enter


• *CTRL, ALT, DELETE


• CTRL, Shift, Delete


• CTRL, ALT, Enter

Pressing the Control + Alt + Delete keys at the same time brings up a menu where you can select Task Manager. None of the other key combinations will open Task Manager.

q_itf2_taskman_03

Which tab in Task Manager can be used to manage programs that load with Windows? Answers:

• *Startup


• Processes


• Performance


• Services


Explanation:

The Startup tab in Task Manager can be used to enable or disable which programs load with Windows. The Processes tab is used to see instances of programs that are running.

The Performance tab show statistics of how the computer and network are performing. The Services tab shows programs that are running in the background. q_itf2_taskman_04

Which of the following is the BEST way to handle a program that is unresponsive? Answers:

• Uninstall and reinstall the program


• *Force-close the program


• Reboot the computer


• Run a virus scan


Explanation:

Force-closing a program that is unresponsive is the best way to handle it. However, doing so may result in a loss of data. Uninstalling and reinstalling the program is not the best way to handle an unresponsive program.

Rebooting the computer may be necessary, but this is a last resort. Running a virus scan would not help in this situation. q_itf2_taskman_privilege

An IT manager wants to limit the rights of employees whose job is to simply create and modify new database records. What is an access control principle that would help them accomplish this?

Answers:

• Type 1 authentication


• *Principle of least privilege


• Non-repudiation


• Single sign-on


Explanation:

The principle of least privilege is an access control principle that states that a user should only be given the permissions

or rights they need to do their job and no more. It could be used by an IT manager to limit employee access to database functionality.

Type 1 authentication is authentication that requires a user to provide something that they know, such as a password or PIN, in order to access a system. It is not an access control principle.

Non-repudiation is the ability to ensure that a user cannot deny that they performed a certain action. It has nothing to do with access control.

Single sign-on (SSO) is a method of authenticating with one system to gain access to other related systems. It may be associated with accounts that have restricted access, but it is not an access control principle.

q_itf2_taskman_process

Tom has started the Task Manager tool and sees a process he would like to stop. He has tried many times to stop the process, but the computer keeps asking him to log in as an administrator. What is the problem in this scenario?

Answers:

• *Tom needs to elevate his computer rights.


• This is not Tom's computer.


• The process cannot be stopped.


• The process is memory-resident.


Explanation:

To stop or start a process, a user must be logged in as an administrator. This is an important security feature; it can keep malware from disabling the virus software.

The computer does not have to belong to Tom for him to administrate it. If he is an administrator and knows the admin password, he can start and stop processes.

All processes can be stopped. Just be aware that some processes are critical and stopping them may cause the computer to have more issues.

Any program or service running on a computer is a memory-resident process. In that case, if the user has administrator rights, they can stop or start a process.

q_itf2_taskman_scheduler

An IT manager wants to run a virus scan on a regular basis for all Windows computers in the company office. Which Windows tool should they use?

Answers:

• *Task Scheduler


• Task Manager


• Device Manager


• Windows Settings


Explanation:

Task Scheduler is a Windows app used to automatically start an application or run a script based on events. Some tasks that are commonly scheduled to run at regular intervals include backups, malware scans, and system updates.

Task Manager lets users perform tasks such as shutting down applications that are not responding or viewing which processes and applications are using system resources. It does not provide task or process scheduling features.

Device Manager is a Windows utility that lets you view and control peripheral devices and other hardware components. It does not provide task or process scheduling features.

Windows Settings is an application in Windows 10 that lets you organize Windows settings and customize how your computer looks and feels. It does not provide task or process scheduling features.

q_itf2_taskman_service

Processes are programs that run automatically in the background. Which type of process (program) is Windows Task Scheduler?

Answers:

• Device manager


• Application


• *Service


• Cron job


Explanation:

A service is a program that performs functions like indexing files, backing up files, and scheduling processes. Windows Task Scheduler falls into this category.

A device manager is a program that performs tasks such as determining which hardware is connected to the system, interpreting instructions from the hardware, and sending instructions to it.

While Windows Task Scheduler is an application, it is more specifically a service.

Cron is a Linux utility that's often used to run tasks or scripts at a particular time. Each of these tasks is known as a cron job.

4.8 System Support Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of support professionals affect my daily life?


• How can I prepare for a career in support?


This section describes common careers in system support. After finishing this section, you should be able to:

• Describe common careers in system support.


• Identify skills and educational requirements for system support careers.


Key terms for this section include the following:

Term Definition


Technical Support Specialist

A specialist that serves as the main contact for a company's help desk or support organization, often performing tasks such as recording help desk tickets, simple troubleshooting, researching a knowledge base, and providing basic support.


Managed Service Provider

A third party technical support organization employed by a company in order to cut costs and focus on business operations.


4.8.1 System Support Careers (Lesson Video) Transcript:

Charles Dickens once said, "No one is useless in this world who lightens the burdens of another." This statement applies to careers in the customer support industry, which are perfect for those who gain satisfaction from helping others. In this video, we'll look at a pair of jobs in the system support field.

Technical support specialists serve as the main contact for a company's help desk or support organization. When it comes to fixing problems, these specialists are the first person an employee or client speaks with. While these can often be entry-level positions, technical support specialists who gain extensive knowledge of software applications and computer systems are extremely valuable to an organization. A level one support technician is responsible for basic tasks such as recording problem descriptions in help desk tickets, simple troubleshooting, researching a knowledge base, and then providing basic support such as resetting passwords and installing printers. When a problem can't be resolved at this level, the ticket is escalated to a higher level of support. These employees require more advanced knowledge and skills, including database administration, software installation, and complex troubleshooting. Issues can frequently be resolved through remote desktop connections, which allow users to give control of their system to a support specialist at another location. The best support specialists are gifted at teaching others, have an abundance of patience, and have acquired good listening and communication skills. If you have a passion for computer technology and you enjoy fixing things and helping others, consider earning an industry certification or an associate degree to qualify for a job as a technical support specialist.

Next, let's look at a managed service provider technician. The main difference between a regular technical support specialist and a managed service provider technician is that an MSP's services are outsourced as a third-party company. Many businesses prefer outsourcing because it allows them to cut costs and focus on their business operations without having to worry about IT administration and data security. Most MSP tech positions require at least two years of prior experience in technical support. Since these support technicians are the face of their company, they need to be knowledgeable with excellent customer service skills. MSP technicians often work with many different organizations with a variety of computer systems. This gives them more opportunities to expand their knowledge and skills. Good technical support specialists have an opportunity to be promoted as service managers or support directors.

In this video we talked about careers in system support. If helping others and resolving computer issues are your thing, then you might want to consider a support career.

4.8.2 System Support Career Facts

System support specialists make a career out of helping others. While many support technicians work full-time for particular businesses, schools, and other organizations, others provide support for a variety of different companies that outsource their technical support needs. This lesson overviews system support careers in both of these categories.

Table 1: System Support Careers Job Title

Description


Technical Support Specialist

Technical support specialists serve as the main contact for a company's help desk or support organization. When it comes to fixing problems, these specialists are the first person an employee or client speaks with. While these can often be entry-level positions, technical support specialists who gain extensive knowledge of software applications and computer systems are extremely valuable to an organization. A level one support technician is responsible for basic tasks such as recording problem descriptions in help desk tickets, simple troubleshooting, researching a knowledge base, and then providing basic support such as resetting passwords and installing printers. When a problem can't be resolved at this level, the ticket is escalated to a higher level of support. These employees require more advanced knowledge and skills, including database administration, software installation, and complex troubleshooting. Issues can frequently be resolved through remote desktop connections, which allow users to give control of their system to a support specialist at another location. The best support specialists are gifted at teaching others, have an abundance of patience, and have acquired good listening and communication skills. If you have a passion for computer technology and you enjoy fixing things and helping others, consider earning an industry certification or an associate degree to qualify for a job as a technical support specialist.


Managed Service Provider Technician

A managed service provider technician works for a third-party company. Many businesses prefer outsourcing their support needs to MSPs because it allows them to cut costs and focus on their business operations without having to worry about IT administration and data security. Most MSP tech positions require at least two years of prior experience in technical support. Since these support technicians are the face of their company, they need to be knowledgeable with excellent customer service skills. MSP technicians often work with many different organizations with a variety of computer systems. This gives them more opportunities to expand their knowledge and skills. Good technical support

specialists have an opportunity to be promoted as service managers or support directors.


4.8.3 Interview: Technical Support Specialist (Lesson Video) Transcript:

The other day we had a computer that was just making this horrendous screeching noise.

One of my favorite things about what I do is just the variety, that every day's a little bit different and it's challenging and I'm constantly learning new things and learning how to deal with new systems and I'm also finding that things that I have to learn for one task come up in another. And so I'm constantly building on that base of knowledge.

So my main responsibilities as a technical support specialist are just dealing with the whole range of hardware and software questions that come in on a daily basis – either sitting at my desk troubleshooting problems, going to other people's desks to look at hardware problems, to help them with software problems they're having. It can be working on projects like getting new laptops and computers ready for new employees as well as for upgrades.

The other day we had a computer that was just making this horrendous screeching noise. We thought it might've been the hard drive, but it wasn't. We looked at the fan because those are moving components, and it wasn't. And it turned out to be the speakers, and we just upgraded the driver for the speakers and that solved it, but it was just a problem that no one on our IT staff had ever seen before.

I think there's a variety of backgrounds for this type of a job. Some people get their start just on their own, I know a lot of people who do a job like this who were just gamers and they started building their own PC or upgrading their graphics card and kind of started learning about how computers work like that and then got into this type of job. Other people go for a degree, some people go for certifications, especially those who start out on their own find certifications are kind of a

good way to prove they have the knowledge needed for the job. I would also say there's a lot of soft skills involved. A lot of times you have to explain technical problems to people who don't have as much of a computer background, and with that you can even kind of train them sometimes to know what to try troubleshooting before they call you. And then also there's a little bit of trust involved, with people just letting you sit down with their computers. And so really being personable and being able to communicate so that people can bring their problems to you and get them solved is important.

I think what's fun is just all the stuff I get to do in my own life. So like, I'm able to take the skills and just do fun computer things at home, and like I run some of my own servers for different stuff. I think the biggest thing is just developing the troubleshooting skills to be able to work on your own. It's really hard to prepare for this type of a job because the problems you face are so varied, and so just getting practice troubleshooting your own computer things and trying to install different software and build your own computer and do that type of thing and learn how to troubleshoot the problems that arise during that process is the best preparation you can have.

4.8.4 Section Quiz (Section Quiz)

5.0 Internet Technologies

5.1 Chapter Introduction


Two young men exploring the vast 'city' of the Internet. Illustration. Internet Technologies

This chapter describes internet technologies such as the world wide web, email, cloud computing, social media, and the Internet of Things (IoT). It explains the importance of protecting online identities, practicing proper email etiquette, and avoiding plagiarism when conducting online research. Students practice configuring web browsers, copying files to the cloud, responding to email messages, and configuring smart devices. The chapter concludes with a brief look at common careers in designing and configuring internet technologies.

After finishing this chapter, you should be able to:

• Describe the essential components of the web, including websites, URLs, hyperlinks, web browsers, and search engines.


• Configure privacy and security settings in web browsers.


• Identify common uses of cloud computing.

• Recognize the risks and responsibilities of using social media.


• Describe various internet communication technologies, including email, streaming media, online chat, and voice over IP (VoIP).


• Identify and configure IoT devices.


• Conduct online research ethically and efficiently.


• Identify common careers in designing and configuring internet technologies.


5.2 The World Wide Web Section Introduction

As you study this section, keep the following questions in mind:

• How are the internet and the world wide web similar? How are they different?


• What internet technologies other than the web do I use?


• How have the internet and the web impacted my life?


After finishing this section, you should be able to:

• Define the internet and the world wide web.


• Describe the essential components of the web, including websites, URLs, hyperlinks, web browsers, and search engines.


• Identify and describe technologies that use the internet, including the web, email, instant messaging, VoIP, and the Internet of Things.


• Compare and contrast desktop applications with web applications.


• Describe the role of online collaboration tools such as blogs, wikis, RSS feeds, and podcasts.


Key terms for this section include the following:

Term Definition


The Internet

The worldwide system of interconnected computers and public networks.


The Web

Short for World Wide Web. Digital content that is delivered over the Internet, usually through a web browser.


Internet Service Providers (ISP)

A company that provides individuals and businesses access to the internet and other related services.


IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network. Hypertext Transfer Protocol (HTTP)

A set of rules that govern the transfer of web content between computers.


File Transfer Protocol (FTP)

A set of rules that govern the transfer of files between computers.


Universal Resource Locator (URL)

The reference or address to a resource on the Internet. Example: http://www.testout.com/home/about/privacy


Domain Name System (DNS)

A system and set of rules that associates domain names (such as web servers) with unique IP addresses so users can find and use network resources by an easily readable name instead of by IP address.


Transmission Control Protocol/Internet Protocol (TCP-IP) A set of rules that facilitates internet communication.


Hypertext Markup Language (HTML)

A computer language that web pages use to display content through web browsers.


Intranet

A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.


Voice over IP (VoIP)

A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.


Wi-Fi

A technology that allows computers, smartphones, and other devices to communicate on a wireless network.


Internet of Things (IoT)

A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.


Web Application

A program or app that uses the internet and a web browser to complete a task. The user's computer interacts with a remote server to access the app.


Blog

A blog is a website that produces content in forms of blog posts that can contain text, images, video, or other media. Blogs usually have a more casual, conversational style than more mainstream websites.


Wiki

An online encyclopedia that uses hyperlinks to connect each entry to other relevant entries.


RSS

A system based on simple text files that are read by a program to provide a stream of updates or feed about a particular topic. RSS originally stood for RDF Site Summary but is also known as "really simple syndication" or "rich-site summary."


Podcast

An audio program split up into episodes that can be enjoyed on demand. Podcast topics can range from cooking, fashion, music, and about any other topic you can think of.

5.2.1 The Internet (Lesson Video) Transcript:

Let's talk about the Internet. Now you're probably using the Internet right now to stream this video. You already know that the Internet gives you access to an endless amount of data and information. It lets you send and receive data on a global system of interconnected devices.

In this video, we'll describe the Internet in terms of networking. As its name implies, the Internet is an internetwork or a connection between networks. The Internet is a collection of many different networks owned by many different entities that all share information and communicate together. The Internet connects devices all around the world. There are parts of the Internet that are managed by large corporations and other parts that are managed by individuals. But no one entity controls the entire Internet.

We may have a city here and a city here and a city here, and they all share a common way of connecting so that they can route signals between each other. At each spot, we will have one or more ISPs, or Internet Service Providers. ISPs don't manage the entire Internet. Instead, they manage an access point to the Internet.

If you think of the Internet as a big freeway, then ISPs would be the entity that manages the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

The ISP is responsible for allowing both individual users, as well as companies with large networks, to connect to the Internet.

In this scenario, there's typically a security boundary that separates your network from the public Internet. You may have devices on your network that access network servers, such as web servers and email servers. They're connected to the Internet, but other computers that are on the Internet cannot come in and contact devices within your network.

As you can see, this creates a division of sorts between networks. Public networks share all devices and they're freely available. On the other hand, devices on a private network can access public network devices, but they themselves can only be accessed by other devices within the private network.

There may be exceptions. For example, in this network we might have a particular server that we do want to make available to the public, such as a server that hosts a website. In order to do this, we would actually need to place our web server outside of this security boundary so that devices in other locations can reach this website through the Internet. In essence, when I do this I've made part of my network public or created a small public network, if you will, that is connected to the larger Internet.

A related term that you might hear from time to time is intranet. An intranet is kind of like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the intranet.

So in summary, the Internet is a large public internetwork, while an intranet is a private network that uses Internet technologies but is only available to users within a particular organization.

In this video, we described the Internet in terms of networking. We also compared and contrasted the Internet with private intranets.

5.2.2 The Web and Other Internet Technologies (Lesson Video) Transcript:

The terms World Wide Web and Internet are often used interchangeably. In this video, you'll learn why they're really not the same thing. The Web is just one of many technologies and services that use the Internet. Other Internet technologies often have nothing to do with the Web.

The Internet typically refers to the vast collection of networking hardware and physical computing devices that allow the exchange of information. These interconnected computing devices follow strict rules or Internet protocols to maintain efficient global communication and data integrity.

The World Wide Web, invented in 1989 by an English scientist named Tim Berners-Lee, refers to interlinked digital content or information that's delivered over the Internet, usually through a web browser. Popular web browsers include Google Chrome, Microsoft Edge, Mozilla Firefox, and Apple Safari. In addition to web browsers and websites, components of the Web include hypertext links between documents, URLs that uniquely identify web pages, and search engines that provide efficient ways of finding information on the Web.

While many web pages simply display static content, web browsers can also run complex computer programs. These programs are known as Web applications or Web apps. Examples include webmail, productivity software such as Google Docs or Google Sheets, multi-player video game sites, and social media apps such as Facebook and Twitter.

Web applications typically exchange information with special computers on the Internet called web servers.

So in summary, when we talk about the Web, we're talking about content, such as text, images, and streaming video, that is delivered through a web browser. The Web uses the physical devices and infrastructure that we call the Internet.

Now let's look at some other technologies that use the Internet.

You probably already know that not all devices on the Internet are physically connected to each other through cables. WiFi is a technology that provides wireless Internet connectivity through devices called wireless routers. A WiFi network uses radio waves to transmit data within a particular area referred to as a hotspot.

Email is an example of a communications technology that may or may not use the Web. But it'll almost always use the Internet. If you access your email through a web browser, you're using a webmail application on the Web. But if you've installed a mail application such as Microsoft Outlook on your personal computer or on your phone, you might not be using the Web at all. Your app can maintain its own Internet connection.

Another technology that uses the Internet is called Voice or Video over IP. VoIP lets people make voice phone calls over digital data lines using Internet protocols. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the call, it's converted into digital data and sent through the network or over the Internet.

The Internet of Things refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies. The Internet of Things is made up of devices such as refrigerators, thermostats, street lights, and environmental tracking systems. These devices all use the Internet to share their data and often allow people to control them remotely.

Another example of making use of Internet technology is an intranet. Many businesses and academic institutions set up their own intranet, which is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the private intranet.

The Web is just one of many technologies that use the vast system of interconnected devices we know as the Internet. By becoming more familiar with technologies such as the Internet of Things, Voice over IP, and business intranets, it's easier to see the distinction between the Web as a system of accessible digital content and the Internet as the collection of physical hardware and protocols that keep them interconnected.

5.2.3 Web and Internet Facts

The Internet gives us access to an endless amount of data and information. It lets us send and receive data on a global system of interconnected devices.

In terms of networking, the Internet is an internetwork , or a connection between networks. It's a collection of many different networks owned by many different entities that all share information and communicate together. Parts of the Internet are managed by large corporations, and other parts are managed by individuals. But no one entity controls the entire Internet.

The table below includes a sampling of common terms and acronyms associated with the Internet. Table 1: Internet Terminology

TERM DESCRIPTION


The Web

Short for World Wide Web , the Web refers to the digital content that is delivered over the Internet, usually through a web browser.


The Internet

While often used synonymously with the Web, the term Internet typically refers to the vast collection of networking hardware and physical computing devices that make up the Internet.


ISP

Internet Service Providers , or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

IP Address

Every computing device that accesses the Internet is assigned a unique Internet Protocol (IP) address. These addresses consist of either four (IPv4) or eight (IPv6) parts. An example of a four-part IP address is 137.75.68.206.


HTTP and FTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.


URL

A URL, or Uniform Resource Locator , is the reference or address to a resource on the Internet. An example of a website URL is http://www.testout.com/home/about/privacy . It consists of a protocol identifier ( HTTP ), a domain name ( www.testout.com ), and an optional path to the resource ( home/about/privacy ).


DNS

DNS, short for Domain Name System , is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.


TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol . It is the suite of protocols or rules that facilitate Internet communication.


HTML

Hypertext Markup Language (HTML) is the programming language that web pages use to display content through web browsers, such as Firefox or Google Chrome.


Intranet

An intranet is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the intranet.


VoIP

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.


WiFi

WiFi is a technology that provides wireless Internet connectivity through wireless routers. A WiFi network uses radio waves to transmit data within a particular area referred to as a hotspot.


Internet of Things

The Internet of Things refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies. The Internet of Things is made up of devices such as refrigerators, thermostats, street lights, and environmental tracking systems.


5.2.4 Web Applications

Before the arrival of the Internet, all applications were run from the computer itself. You had to install the software and run it from your machine each time you launched the program. Nowadays, developers have the option to run some

applications within a web browser without installing the software on their local computer. Both of these software- delivery methods have advantages and disadvantages that you should be aware of when choosing an program to work with.

Web Applications


An arrow representing communication between a computer and the cloud. Illustration.

Simply put, a web application is a program or app that uses the Internet and a web browser to complete a task. The user's computer interacts with a remote server to access the app. The user gives commands and requests information, and the requests are fulfilled by the server. The server sends back information to the web browser on the user's computer, and the browser then renders the information on the user's screen.

A popular example of a web application is Google Apps. These are all programs that can be run from a web browser to complete various tasks, such as word processing (Google Docs), sending emails (Gmail), and online storage (Google Drive). Many similar apps are connected to the cloud, which means that multiple people can view and interact with the same file simultaneously.

Some companies provide their software using the Software as a Service (SaaS) model. The users pay a monthly or annual fee and the company allows those users to access their software.

Often, web applications are built directly into web pages in order to perform a specific function. For example, any time you've used an online shopping cart when purchasing something online, you've used a web application.

Desktop Applications


An installed desktop application shown on a computer screen. Illustration.

A desktop application is a traditional computer program. These types of programs have to first be installed on a computer. The computer runs the program from its hard drive each time it needs to be launched. Desktop applications have minimum hardware requirements, and a particular app is usually made for a specific operating system (most likely Windows, macOS, or Linux).

A popular example of a desktop application is the traditional Microsoft Office bundle, which includes Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. These programs run from a user's local machine in order to help them perform certain tasks. This is in contrast to the Microsoft 365 suite which contains web-based versions of each of these programs.

Pros and Cons

Both options have pros and cons. Web applications have the advantage of allowing easier collaboration. They can connect people in vastly different locations and allow them to work on the same project at the same time. They also have the advantage of being more compatible than most desktop applications. They can run on a variety of platforms and operating systems and don't have to be installed on the user's hard drive, which means they don't take up space on the user's computer. Desktop applications can be large and can require a significant investment for storage space. Web applications also help drive down costs for both the business and users because these kinds of applications usually require less support and maintenance. You don't even have to install a web app as long as you have a web browser set up.

Desktop applications have the advantage of being less dependent on internet service. If there's an internet outage, web applications are rendered useless. Often, high-speed internet is required for you to take full advantage of them as well, which is a perpetual cost that comes along with their use. Desktop apps often only have be to purchased once, unlike many web applications which carry a monthly or yearly fee. Also, many desktop applications are easier to customize for your own personal use. Web applications take more of a one-size-fits-all approach.

However, desktop applications can be limited by the hardware on which they're run. If the user's computer is outdated, the application may not run as intended. For web applications, much of the work is done by remote servers, which reduces the load on the user's computer. A lot of a web application's performance comes down to the Internet speed, which can be a pro or con depending on your situation.

5.2.5 Blogs and Wikis

Blogs and wikis are popular ways to share information online. They can cover a variety of topics and include written text and other forms of multimedia, such as images, videos, and audio recordings.

What Is a Blog?

The word "blog" comes from the combination of "web" and "log." The owner of the blog produces posts that appear on the main page, usually with the most recent post at the top. A blog post can contain text, images, video, or other media. They usually have a more casual, conversational style than most mainstream websites.

Successful blogs are updated on a regular basis. Other people can subscribe to the blog to receive a notification whenever there's a new post. They can also leave comments on posts to express their opinion or answer a question that the blog's author asked in the post. Readers can also share blog posts on social media, which helps them gain a wider audience.

Many small or private blogs use free hosting services. Larger, more popular blogs typically use paid hosting sites that offer additional features such as custom domain names, online marketplaces, and automated communication with subscribers.

TestOut's Continuing Education Blog


TestOut's Continuing Education Blog. Screenshot. What Is a Wiki?

A wiki is an online encyclopedia that uses hyperlinks to connect each entry to other relevant entries. The word comes from the Hawaiian word wiki-wiki, which means "quick." Most wikis are dedicated to a single topic, such as a TV show, video game, or specific historical period.

The most well-known wiki is Wikipedia, which has entries on just about any subject you can imagine. Wikipedia articles are written and edited by volunteers around the world. Contrary to what many believe, information on Wikipedia is generally accurate and reliable—far more reliable, in fact, than most traditional encyclopedias. That said, Wikipedia should never be used as a primary source of information. If you're writing a research paper for school or want to be certain that an article is accurate, you should refer to the sources cited by the article to verify their authenticity.

Wikipedia Logo


Wikipedia logo.

How Do You Start a Blog or Wiki?

There are many hosting options that offer a free tier for blog hosting along with other paid tiers with additional features. The following are common sites where people can host their blogs:

• Blogger (free)


• WordPress (free and paid plans)


• Google Sites (free)


• Wix (free and paid plans)


• Squarespace (free and paid plans)


• Weebly (free and paid plans)


The blogging platform you use should be based on the features that you need and your understanding of web design. Many blog-hosting sites provide powerful tools that let you customize the look and feel of your blog and add useful widgets to it, such as embedded contact forms, embedded calendars that like to an Outlook or Google calendar, or image slideshows.

Whether or not you pay for hosting partially depends on whether your blog is monetized. If you're making money from your blog, either through selling products or through advertisement revenue, it may make sense to pay a monthly fee to have the site hosted. If not, it may make more sense to stay with a free option.

5.2.6 RSS Feeds and Podcasts

The acronym RSS originally stood for RDF Site Summary, but it's also been called "really simple syndication" or "rich- site summary." RSS is based on simple text files that are read by a program called an RSS reader to provide a stream of updates about a particular topic. These started out as only providing text updates, but then quickly expanded to updating with images, audio, and video. While RSS feeds are not nearly as popular today as they once were, they are still an excellent way to keep up to date on topics you're interested in. This is especially true for podcasts and other web content that includes regular updates. In this lesson, we'll explain a little more about both podcasts and RSS feeds.

Podcasting

A microphone emitting audio. Illustration.

Podcasts are like talk radio episodes that can be enjoyed on demand. There are thousands of podcasts available today, and many of them are free. People release podcasts about cooking, history, true crime, fashion, comedy, music, and about any other topic you can think of.

Podcasts are split up into episodes, much like TV shows. One way you can make sure never to miss an episode of your favorite podcast is to subscribe to the RSS feed for that podcast. Every time a new episode is published, your feed will be updated and you'll be able to listen.

Podcasts can be enjoyed through a variety of digital platforms, such as iTunes, directly from web browsers, podcast apps on smartphones, and more. Episodes can often be streamed live or downloaded so that you can listen to them later.

Subscribing to an RSS Feed RSS Logo


RSS logo.

To subscribe to an RSS feed, you'll need to select an RSS reader. There are many free RSS readers available online, including Digg Reader, Freereader Online, CommaFeed, FlowReader, and Feedly.

Once you've installed an RSS reader, you'll need to navigate to the blog or website that contains the RSS feed you want to subscribe to. Some websites include the orange and white RSS logo to show that a feed is available.

After entering the URL for your desired feed, you will be subscribed. Check back later for new content that has been published in the feed.

You can tailor your RSS feeds so that you receive custom updates on only the things you want to see. Setting Up Your Own RSS Feed

If you have your own podcast or site that provides users with frequent updates, using an RSS feed is a great way to boost your traffic. In order to create one, you'll either need to use an RSS creation program or learn how to create the files by yourself (this is a much more complicated process). Blogging sites such as WordPress include built-in support for RSS feeds.

RSS feed creation programs all require you to create a title for your feed (this should be the same as the name of your site or podcast). You should enter a URL for your website to give your listeners somewhere to connect with you and also have a description for your feed so that your listeners understand what sort of content you're producing. Most programs also allow you to add an image.

Once you've created a feed, you need to add content to it. To do this, enter the title of your episode or post, a publishing date, and then the URL that will lead users directly to that content. Each piece of new content should come with a short description that helps drive user interest.

After you've added all of your current content to the feed, export your feed into an XML file. This is the file that allows users to subscribe. This XML file should then be uploaded to your website in a prominent place so that users can access your feed. Some types of software will actually create a link to your feed that you can place on your site instead.

5.2.7 Activity: Subscribe to an RSS Feed

While RSS feeds are not nearly as popular today as they were several years ago, they can still serve a valuable purpose. Subscribing to an RSS feed is also a good exercise in learning about internet technology in general. In this activity, you'll use a feed reader to subscribe to an RSS feed. Do the following:

1. Install an RSS feed reader of your choice. Free readers include Feedly , The Old Reader , and many more.


2. Use the feed reader you've installed to subscribe to an RSS feed of your choice. Examples include news, weather, and government websites that regularly publish new content and include RSS feeds for that content. For example, you could use nasa.gov/content/nasa-rss-feeds to select from a number of different NASA feeds. Some websites include the orange and white RSS logo to show that a feed is available.


3. After a few hours or perhaps a day or two, open your RSS feed reader again and check for new content that has been published in the feed to which you've subscribed.


5.2.8 Section Quiz (Section Quiz) q_itf_internet_facts_01

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Answers:

• *Internet


• Internet of Things


• Intranet


• Local Area Network


Explanation:

The internet is an internetwork, or a connection between networks. It is made up of a vast collection of networking hardware and physical computing devices all over the world.

The Internet of Things (IoT) is a computing concept that describes the network of physical devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate and share data over the internet.

An intranet is like a miniature internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the internet, such as websites and email.

A Local Area Network (LAN) is a group of networked computers that are physically close together, usually in the same building.

q_itf_internet_facts_02

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

Answers:

• *World Wide Web


• Internet


• Intranet


• Wide Area Network


Explanation:

The World Wide Web is a system for making digital content publicly available over the internet using a web browser. While often used synonymously with the Web, the term internet typically refers to the vast collection of networking hardware and physical computing devices that make up the internet.

An intranet is like a miniature internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the internet, such as websites and email.

A Wide Area Network (WAN) is a network of interconnected LANs across a large geographical location. q_itf_internet_facts_03

Which of the following terms describes an organization that connects users to the Internet? Answers:

• *Internet Service Provider


• Network Server


• Data Center


• Web Server


Explanation:

An Internet Service Provider (ISP) manages an access point to the internet.

Network servers are computers on a network that provide services to clients. They include file servers, mail servers, web servers, and database servers.

A data center is a facility that houses an organization's most critical computing and information systems.

A web server stores web pages as hypertext documents and transmits requested files using HTTP and HTTPS. q_itf_internet_facts_04

A       is a private network that utilizes the same technologies as the Internet. Answers:

• *Intranet


• World Wide Web


• Local Area Network


• Wide Area Network


Explanation:

An intranet is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email.

The World Wide Web is a system for making digital content publicly available over the internet using a web browser. A Local Area Network (LAN) is a group of networked computers that are physically close together, usually in the same building.

A Wide Area Network (WAN) is a network of interconnected LANs across a large geographical location. q_itf_internet_facts_05

Which of the following is used to identify specific hypertext resources on the World Wide Web? Answers:

• *Uniform Resource Locator


• Hyperlink


• Transmission Control Protocol


• Internet Protocol


Explanation:

A Uniform Resource Locator (URL) is entered into the address bar near the top of browser window. It is the reference or address to a web resource.

While clicking on a hyperlink can send you to a specific webpage or URL, the link itself does not identify a hypertext resource.

The Transmission Control Protocol (TCP) is an important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.

The Internet Protocol (IP) is the principal communications protocol in the internet protocol suite that is used to route information over the Internet.

q_itf_internet_facts_06

Which medium does Wi-Fi use to send data between networks and devices? Answers:

• *Radio waves


• Cellular signals


• Bluetooth


• Ultraviolet light

Explanation:

Wi-Fi is a wireless networking technology that uses radio waves to transmit data within a particular area referred to as a hotspot.

A cellular network provides radio coverage to subscribers over a large geographical area.

Bluetooth is a short-range wireless communication technology typically used to connect peripherals such as wireless headphones, speakers, keyboards, and mice.

Ultraviolet light is an invisible band of radiation at the upper end of the visible light spectrum. It is not used for data transmission.

q_itf_internet_facts_07

Which of the following technologies can be used to make a phone call over an Internet connection? Answers:

• *VoIP


• TCP


• UDP


• IoT


Explanation:

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.

The Internet of Things (IoT) is a computing concept that describes the network of physical devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate and share data over the internet.

The Transmission Control Protocol (TCP) is an important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.

The User Datagram Protocol (UDP) is an important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn't verify that the packets were correctly received.

q_itf_internet_facts_08

Which of the following technologies carry phone calls over an IP-based network? Answers:

• *VoIP


• TCP


• RTSP


• HTTP


Explanation:

Voice over IP (VoIP) is a method for carrying phone calls over an IP-based network. RTSP is used to stream multimedia content over IP networks. HyperText Transfer Protocol (HTTP) is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets. Transmission Control Protocol (TCP) is a protocol which guarantees that data arrives at a destination without errors. VoIP is usually implemented on top of UDP instead of TCP to reduce latency.

q_itf_internet_facts_09

Match each term on the left to its definition on the right. Answers:

• World Wide Web


• Internet


• Browser


• Cloud computing


• Internet Service Provider


Explanation:

Cloud computing is services or software applications that rely on shared resources over the Internet. A browser is a software application that accesses web applications and websites.

An Internet Service Provider, or ISP, is a company that provides access to the Internet. The Internet is an interconnected, global, public computer network.

The World Wide Web is an information system that connects documents to each other by hypertext links. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf2_webapps_01

Which of the following is a disadvantage of web applications? Answers:

• *Web applications can carry a monthly or yearly fee.


• Web applications can be limited by the hardware they run on.


• Web applications can connect people in different locations.


• Web applications can require a significant amount of disk space.


Explanation:

A disadvantage of web applications is that they can carry a monthly or yearly fee in order to continue their use.

An advantage of web application is that they can connect people, even those in vastly different locations, and allow them to work on the same project at the same time.

Disadvantages of desktop applications are that they can be large and can require significant space on the user's computer. They can also be limited by the hardware on which they are run. If the user's computer is outdated, the application may not run as intended.

q_itf2_rsspodcasts_01

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Answers:

• Blogs


• *Wikis


• RSS feeds


• Podcasts


Explanation:

Most wikis can be edited by any user with an account. This means that you should be careful with trusting the information you find on wikis. The information may seem to be from a credible source but may in fact not be.

A blog post can contain text, images, video, or other media. They usually have a more casual, conversational style than most mainstream websites.

RSS feeds started out as only providing text updates, but they quickly expanded to updating with images, audio, and video as well. Today, they are an excellent way to keep up to date on topics you are interested in. This is especially true when it comes to content creators that produce regular content such as daily podcasts.

A podcast is like episodes of talk radio that can be enjoyed on demand. There are thousands of podcasts available today, and many of them are free.

5.3 Web Browsers Section Introduction

As you study this section, keep the following questions in mind:

• What is the relationship between a browser and the world wide web?


• How can understanding the structure of URLs help me browse more effectively?


• How can I troubleshoot web browser problems?


This section introduces you to web browsers and gives you practice using search engines, navigating web pages, and configuring basic browser settings. After finishing this section, you should be able to:

• Use a web browser to access the world wide web.


• Identify each of the component parts of a URL.


• Use browser features such as private browsing, bookmarks, and downloading files.


• Describe key browser and website features, including plug-ins, client-side scripting, certificates, caching, and proxy settings.


• Configure browser privacy and security features such as pop-up blockers, location tracking, and cookies.


• Clear a browser's cache.


• Troubleshoot common browser problems.


• Configure proxy server settings on a computer to control internet access.


Key terms for this section include the following:

Term Definition


Web Browser

An application for accessing information on the World Wide Web.


Web Search

A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.


Cookie

A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.

Browser Extension

Software that adds functionality to a web browser.


Client-Side Scripting

The process of transferring source code from a web server to a web browser and running that code directly in the browser.


Certificate

A digital document that contains encryption keys and is used for encryption and identification.


Caching

The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.


Proxy Server

A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.


Pop-up Blocker

A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.


IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network.


5.3.1 Using Web Browsers (Lesson Video) Transcript:

A web browser is an application that's used to access files through the Internet. The word "web" is short for World Wide Web, which refers to the naming and linking of digital content stored on the Internet. Some commonly used web browsers include Microsoft Edge, Mozilla Firefox, Apple Safari, and Google Chrome.

In this video, we'll demonstrate how to use a web browser to perform some basic Internet searches and browse the web. We'll use Google Chrome, but other web browsers function in similar ways.

Let's start by opening Chrome. Notice that the browser opens to the default Google startup page. This page includes a Google search box and links to frequently accessed websites.

At the top of the window is the address bar. This is where you can type the address for the website you want to visit. Another name for a web address is URL, or Uniform Resource Locator. In this example, let's visit the TestOut company website. We'll move our mouse to the address bar, click inside to begin typing, type testout.com, and then press Enter. On the TestOut home page, notice that if you hover your cursor over certain words or images, the white arrow turns into a pointed finger. This lets you know there's a hyperlink to another webpage or to more information. Sometimes hovering over a hyperlink opens a dropdown menu.

If you've navigated to the wrong webpage, you can always click on this left arrow, called the back button, to return to the previous page. From here, you can use the forward button to return to the TestOut website.

What if you'd like to see a list of all the web pages you've previously visited? To do this in Chrome, you can click and hold down the Back button. Then select Show Full History. To return to one of these previously visited sites, simply click one of the links.

If you share your computer with someone else and don't want Chrome to track your browsing activity, you can open a window in incognito mode. This is also called private browsing. Be aware that private browsing will only prevent the web browser from tracking your activity. If you're using a computer at school or work, your browsing will still be visible to network administrators. Private browsing is particularly useful for logging into websites on someone else's computer. You can access your email or social media without logging out the owner, and the computer won't remember your login

information.

To change the Chrome startup options and other settings, click the Chrome menu in the upper right-hand corner of the browser and select Settings. As we noted, Chrome is currently set to use the New Tab page on startup, but we could change this to open a different web page. We could also change the address of the home page, which is currently set as testout.com. In some web browsers, the home page is the same as the startup page. The home page is accessed by clicking the home button next to the address bar.

Some web pages allow you to download a file. The file link may let you specify where to save the file. Or it might download automatically to a default location, such as the Downloads folder in Windows. In Chrome, you can view all of your current downloads by clicking Show All in the lower right-hand corner of the browser. Or you can click the Chrome menu and select Downloads.

Now let's go back to Google's search engine and perform an Internet search. After clicking inside the address bar again, we'll type google.com and press Enter. Search engines are tools that gather relevant websites from around the internet and show them to you in a list. Every search engine has a text entry box like this one, where you can type the information you're looking for.

Suppose we want to find the TestOut course catalog page, but we can't remember the web address. In this case, a search engine can help us find what we're looking for. After clicking inside the text entry box, we'll type "testout catalog" and press Enter to see the search engine results. As you can see, the top result is a link to the TestOut Course Catalog page. Let's click the hyperlink to go the webpage.

You can also perform web searches directly from the address bar at the top of the web browser. In this case, the search will be performed by the web browser's default search engine.

Let's do the same search we performed previously. We'll type the search terms "testout catalog" here in the address bar and press Enter. Since we typed words without an extension like dot com or dot org, the web browser assumes we're entering search terms rather than a URL.

The search results are identical to our previous search, since Chrome uses Google as the default search engine. If we were using the Microsoft Edge browser, the search results would be sent from Bing, which is the default Microsoft search engine.

Now suppose we want to find the TestOut website more quickly in the future. To do this, we can add a bookmark. First, we'll go to the upper right corner of the web browser and click this star symbol. We'll add the bookmark to the bookmarks bar and click Done. To return to the bookmarked page, we can click the Chrome menu and select Bookmarks.

If we open a new tab in the browser, we can see the bookmark conveniently below the address bar.

In this video, we learned how to use a web browser to navigate to webpages on the Internet and how to use a search engine. We also learned how to view our browsing history, use private browsing, modify basic settings, download files, and add bookmarks, which store links to different websites.

5.3.2 URLs (Lesson Video) Transcript:

Every single resource on the World Wide Web has a unique name assigned to it. This is called the Uniform Resource Locator, or URL. Webpages, images, videos, files, and applications all have URLs.

In this video, we'll talk about the parts that make up a URL. We'll start with the parts that all URLs have, then talk about a couple that are optional.

First, let's talk about the top-level domain. These are the biggest categories the Domain Name System sorts web resources into. You're probably already familiar with the most common ones - .com for commercial websites, .org for organizations, .edu for schools, and .gov for governments. There are also top-level domains for geographical areas - .nz for New Zealand, .mx for Mexico, and so on.

Recently, a whole bunch of new top-level domains were approved that are more descriptive and specific. In a few years, websites with TLDs like .bank, .food, and .movie will be much more common.

The second-level domain, which is located right before the top-level domain, is generally the name of the website. The two domains are separated by a dot.

Some websites are divided into smaller sections, called subdomains. This is generally done when different parts of a website have different functions. The subdomain appears right before the second-level domain. For example, Google uses the www subdomain to direct to its homepage. Other google subdomains include images, maps, books, and mail. Full URLs begin with the name of a protocol. A Protocol is a set of rules computers use to communicate with each other. Most websites use the http or https protocol, but URLs may begin with other protocols such as ftp.

The last component that's part of every URL is a file path. The file path tells the domain which file it should retrieve and

send to the user. As you can see, a URL file path is pretty similar to your computer's file structure. Each directory, or folder, is designated by a slash, and it ends with a specific file that includes the file extension.

A URL's path and file information are always there, but sometimes they're hidden from the user. If we go to nasa.gov, it looks like there is no file path. However, the page we're really looking at here is nasa.gov/index.html, which is the website's default home page.

Now that we've talked about all the essential parts of a URL, let's look at a couple of optional enhancements. HTML anchors, which are designated by an octothorpe or hash sign, make a website jump directly to a specific HTML element, such as a heading. This URL takes us to the Wikipedia page about Grace Hopper, an important computer scientist. If we add an html anchor to the end of the URL, the page takes us directly to the section about her career.

Finally, let's talk about parameters, which pass additional information to a website. They are typically located at the very end of a URL and are designated by a question mark. Parameters take the form of key/value pairs. Let's look at this YouTube URL. Here at the end, it has one parameter. The key is the letter v, and the value of v is this string of letters and numbers. This value is a unique identifier that tells YouTube which video to load from its database. We can add additional parameters by using an ampersand. This second parameter has a value of t, which stands for time. Its value is 43s. This new URL tells YouTube to load the video and start playing at the 43 second mark. Try it out yourself!

In this video, we talked about the component parts of a URL. We started with the essential parts of every URL – Top- level domain, second-level domain, subdomain, protocol, and file path. We also talked about two optional features – HTML anchors and parameters.

5.3.3 Website Navigation Facts

There are millions of websites, each with its own design and content. However, there are some patterns and features that are common to many websites. The first table describes navigation features on the TestOut website.

These features are similar to many sites you'll see as you use the Web. The second table describes common features of web browsers.

Image 1: Website Example


TestOut's website homepage. Screenshot. Table 1: Website Navigation Features Features/Terms

Description


1. Link to home page

Many corporate websites have their company logo near the top left of each page of their


2. Navigation bar

Most corporate websites have a group of links th


3. Sign up/login

The first time you use a new website, you'll often need to create an account to access


4. Chat with a Companies f

5.3.4 Configuring Web Browsers (Lesson Video) Transcript:

Web browsers have become essential tools for most businesses and other organizations. However, they are also vulnerable to security threats. In this video, we'll discuss some of the most important web browser technologies that can protect you against these threats.

Cookies are files that store data for specific websites. This data may contain information about your browsing habits and preferences, or even your email account and favorite sites. They can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it.

If an attacker has access to these files, they can gather your personal information. It's important to review the security settings for cookie storage on your computer. A common practice is to block third-party cookies, which are placed on your computer by advertisers and other sites with a domain name other than the one you're currently visiting.

Plug-ins and other browser extensions such as the Adobe Flash Player can be installed to enhance the appearance and functionality of websites. Untrusted extensions can take advantage of security vulnerabilities. Extensions can be temporarily disabled on particular browsers, or they can be deleted from the system.

If you need to install a plug-in to use a legitimate website, make sure it's up-to-date with the latest version.

Scripting languages such as PHP and JavaScript are used to extend the functionality of web pages. The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself. Since client-side scripting is a security risk on untrusted sites, it can be deactivated in some web browsers. However, since most modern websites rely on client-side scripting, it usually needs to be allowed. For greater control over which websites can run scripts, you could also choose to install a script blocker add-on for your browser.

Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption. To determine whether a website is using this safer protocol, you can look for the padlock symbol in the address bar. This will let you know that the site is using a valid digital certificate.

The browser cache refers to the storage location for images, sounds, web pages, and other information associated with particular websites. In addition to taking up space on your computer, data in the cache could be retrieved by someone with access to your computer. To provide some level of protection, you should clear the Web browser cache after you use a public computer to access the Internet.

A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. Proxy servers can improve performance on frequently-used websites. They can also be used to prevent access to specific websites.

A popup blocker is a feature of most web browsers that prevents popup windows such as advertisements from being displayed. If a website uses popups in a useful way, you can disable the popup blocker for that site.

Whatever web browser you decide to use, make sure you're using the latest version. Older browsers often have security holes that are easy entry points for attackers if they're not patched. Some older browser versions are no longer even supported by the company that created them.

Since many web applications enable different functionalities on your browser that leave you vulnerable to attacks, the safest policy is to disable most functions that are not absolutely necessary for the application. Then, if you determine a website is trustworthy, you can temporarily enable the functionalities as needed.

Let's now look briefly at some of the security settings within the Google Chrome browser. We'll open the Chrome menu and select Settings.

From the main menu, open the Advanced section and go to Privacy and security. From here, we'll look at some Content settings. In the Cookies section, we can see the option to block third party cookies.

We can also see that JavaScript is allowed to run in the browser and that popups are currently blocked. Returning to the previous menu, we see the option to clear the browser cache and other browsing data.

Web browsers can pose a significant threat to an organization. But because so much of today's work is done via the internet, it's unrealistic to simply disable a computer's web browser. Instead, you need to educate yourself on the various web browser threats and properly protect your network from them.

5.3.5 Web Browser Troubleshooting (Lesson Video) Transcript:

Even if you're relatively new to browsing the web on a desktop computer, you've probably experienced the frustration of clicking on a link that won't respond or having your browser freeze up. In this video, we'll demonstrate some basic troubleshooting tips that you can use on any browser.

We'll start with a common problem that you might encounter when using a website that requires popup windows. In this example, we're using Google Chrome. Notice this message next to the address bar that tells us a popup window has

been blocked. The reason web browsers often block popup windows is to protect you from malware. However, since legitimate websites also use popup windows, we can disable the popup blocker for specific sites.

To verify that popup windows from this site are now allowed, we'll go to the Chrome menu in the upper-right corner of the window and then Settings. From here, we'll open the Advanced settings and go to Privacy and security, then Content settings. In the Popups and redirects section, we see that this domain is now allowed to use popup windows. If we wanted to allow another site, we would click Add and then enter its domain name.

Some websites require that you install a browser extension to support new functionality. If the extension does not appear to be working, check to make sure it's enabled in the browser. In Chrome settings, open an Extensions tab and turn the extension on. In some cases, you may need to remove an extension that's incompatible with others.

Returning to the Chrome menu, we'll notice another important setting for troubleshooting. Under More tools, we can see the option to clear browsing data. When you navigate to a website, the browser downloads and stores a copy of that website's content on your computer. This stored information is called the browser cache. Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to "clear the cache," or delete this stored information.

In Chrome, when we click this Clear data button, we delete our browsing and download history, cookies, passwords, and other website data.

When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets us start with fresh content.

Finally, a good tip for any computer problem you may run into is to restart your system, which will turn the whole computer off, then on again. To restart your Windows system, click the Start button at the bottom-left corner of the screen. Click this Power icon, then click Restart. This is a step you should always take before you call a technical support helpline, including TestOut's support team.

This video offered a few troubleshooting tips to help when you run into problems with your web browser. These tips include turning off the popup blocker for specific sites, enabling and disabling browser extensions, clearing your browser's cache, closing and restarting your browser, trying a different browser, and restarting your computer.

5.3.6 Web Browser Facts

This lesson covers the topic of browser security and troubleshooting features. Browser Security and Troubleshooting Features

The following table summarizes web browser technologies that can protect against threats. It also describes basic troubleshooting tips that you can use on any browser.

Table 1: Browser Security and Troubleshooting Features Feature

Description


Cookies

Cookies store data for specific websites. Cookies:


Browser Plug


Client-side scripting

Scripting languages such as PHP and JavaScript extend the functionality of web pages. Keep


Certificates

Ecommerce and other websites that handle sensitive information should be certified to indicate


Caching

The browser cache is the storage location for images, sounds, web pages, and other


Proxy Servers

A proxy server is a device that stands as an intermediary between an application such as a


Pop

A pop

Safe

Whatever web browser you decide to use, make sure you're using the latest version. Consider


Compatible

If your web browser is not displaying website content properly, consider installing and using a


Browser Restart

When a web browser becomes unresponsive or slow, the problem can often be fixed by


Computer Restart

A good tip for any computer pr


5.3.7 Clear Browser Cache (Demo Video) Transcript:

In this scenario, you want to clear all your browsing data from Google Chrome. Start by opening Chrome. We'll maximize the window to make it easier to see what we're doing. To open Chrome's settings menu, click the kebab icon, then settings. Scroll down to the bottom and click Advanced. In the Privacy and Security section, click Clear browsing data.

This menu shows the three most common items people tend to clear from their browsing data. Browsing history is a list of all the websites you've visited. Cookies are small files that websites store on your computer so they can remember information about you. The browser cache temporarily stores files from the Internet on your computer, which helps sites load faster when you visit them again. Often, when a website is misbehaving, such as one of the labs in this course, the problem can often be solved by leaving the site, clearing the cache, and trying again.

To complete this task, set the time range to All Time. Click Advanced, make sure all the boxes are checked, then click Clear Data.

5.3.8 Clear Browser Cache (Simulation)

Scenario

You use Google Chrome for your web browser on the desktop computer in your dorm room.

You're concerned about privacy and security while surfing the Web. You're particularly concerned about exploits that harvest data from your Chrome browsing history.

Your task in this lab is to clear all Chrome browsing data (all time), including:

• Browsing history


• Download history


• Cookies and other site data


• Cached images and files


• Passwords and other sign-in data


• Autofill form data


• Site settings


• Hosted app data


Explanation

To complete this lab, open the Chrome Clear browsing data dialog and select all types of data for deletion. Be sure to select All time for the time range.

Complete the following:

1. At the bottom of the screen, click the Google Chrome icon.


2. In the upper-right corner of the window, click the kebab icon.


3. Select More tools , then Clear browsing data...


4. In the Clear browsing data pop-up window, on the Advanced tab, select All time .


5. Select all browsing data options and click Clear data .


5.3.9 Configure Browser Settings (Demo Video) Transcript:

In this lab, you'll customize several settings in the Chrome web browser. To start, open Chrome. We'll maximize the window to make it easier to see what we're doing. To access the browser's settings, click the kebab icon, then Settings. First, we'll configure the pop-up blocker. Click the hamburger menu, then Advanced, then Privacy and Security. Next, click Site settings, then pop-ups and redirects. Toggle the Allowed option to Blocked. Click the kebab icon next to Dr. Evil's Key Logger, then click Remove.

Now let's add a website to the pop-up blocker that uses pop-ups for legitimate purposes. Click this Add button, type mybank.com, then click Add. We're done configuring pop-up blocker now, so we can click this back button to go back to site settings.

Next, let's turn off location tracking. Toggle the Ask before accessing option to blocked, then click back.

Last, let's block third-party cookies. Click Cookies, then toggle Block third-party cookies on. Finally, click the kebab icons next to these two suspicious looking websites and select Block.

5.3.10 Configure Browser Settings (Simulation) Scenario

You use Google Chrome as your web browser on the desktop computer in your dorm room.

Because you're concerned about privacy and security while surfing the Web, you decide to block pop-ups from banner

ad companies. However, you still want the computer to accept pop-ups from legitimate sites, such as your bank's website.

You also want to block location tracking and third-party cookies in the browser.

Your task in this lab is to configure the content settings in Google Chrome as follows:

• Configure the pop-up blocker to block all pop-ups and redirects.


• Remove the doctorevilskeylogger.com site that is currently allowed to use pop-ups.


• Configure a new exception to allow pop-ups from mybank.com .


• Block all location tracking in the browser.


• Block third-party websites from saving and reading cookie data.


• Block the virusclickjacking4u.org and darkwebphishing.org sites that are currently allowed to use cookies.


Explanation

Start Google Chrome and use the Privacy and security settings to configure the following:

• Configure the pop-up blocker to block all pop-ups and redirects.


• Remove the doctorevilskeylogger.com site that is currently allowed to use pop-ups.


• Configure a new exception to allow pop-ups from mybank.com .


• Block all location tracking in the browser. Leave the site exceptions in place.


• Block third-party websites from saving and reading cookie data.


• Block the virusclickjacking4u.org and darkwebphishing.org sites that are currently allowed to use cookies.


Complete the following:

1. At the bottom of the screen, click the Google Chrome icon.


2. To configure the Pop-up Blocker settings: 1. In the upper-right corner of the window, click the kebab icon and select Settings .


2. In the upper-left corner of the window, click the hamburger icon. 1. Click Advanced .


2. Click Privacy and security .


3. Click Site settings .


4. Select Pop-ups and redirects .


5. Toggle the Allowed option to Blocked (recommended) .


6. At the right of http://www.doctorevilskeylogger.com , click the kebab icon, then select Remove .


7. In the Allow section, click the Add button.

8. In the Add a site pop-up window, enter mybank.com and click Add .


9. Click the back arrow next to Pop-ups and redirects .


3. To block location tracking: 1. Select Location .


2. Toggle the Ask before accessing (recommended) option to Blocked .


3. Click the back arrow next to Location .


4. To block third-party cookies: 1. Select Cookies .


2. Select the toggle button next to Block third-party cookies .


3. At the right of http://www.virusclickjacking4u.org , click the kebab icon, then select Block .


4. At the right of http://www.darkwebphishing.org , click the kebab icon, then select Block .


5. Click the back arrow next to Cookies .


5.3.11 Proxy Servers

Think of a proxy server as a gateway between you and the internet. It's a middle ground that provides extra security, privacy, and protection for the end user. When a proxy server is in place, the information is sent first to it and then to the end user, with the same thing happening in reverse. Many people use proxy servers because of the sheer number of malicious sites on the internet that can harm your computer or steal your personal information.

Internet Protocol Addresses Proxy Server Diagram


Proxy server diagram. Illustration.

Every computer on the internet has a unique identifier known as an Internet Protocol (IP) address, which can be thought of as similar to a street address. Having an address system like we do allows us all to give directions to our homes and send mail in an easy and standardized way.

The same is true with proxy servers. They have their own IP address, like a post office that collects mail and sorts it before it's sent out to its final destination. The same line of thinking applies to visiting a website with a proxy server— it makes the website request on your behalf. Following this, it receives the response from the website and sends it to you in your web browser. Sometimes, proxy servers change the data before sending it to you or back to the website.

There are a few different categories of proxy servers, including the following:

Transparent Proxy Servers : This kind of server tells websites that it is in fact a proxy server and passes along your IP address so that your identity and location are known. These are easy to set up and are often used on public computers, such as those at libraries and schools.

Anonymous Proxy Servers : This kind of server tells websites that it is in fact a proxy server, but it doesn't pass along your IP address. This means that you remain private and helps you avoid being given content such as location-specific advertisements.

Distorting Proxy Servers : This kind of server tells websites that it is in fact a proxy server, but then passes along a false

IP address. This means that you appear to be in a different place than where you actually are.

High-Anonymity Proxy Servers : These proxy servers periodically change the IP address they give out, making it the most secure and difficult to track of all the different types.

Privacy and Performance

One thing that a proxy server can do is change your IP address before it contacts the website. This masks where you are in the world and provides you a layer of privacy as you conduct your business on the internet. It can also encrypt your data while it's being transported. This means that it won't be readable while it's being transported. So even if someone intercepts your data, they won't be able to read it, which keeps you safe from having sensitive data fall into the wrong hands.

A good proxy service can also help improve network performance. The proxy server does this by creating a cached version of websites that you visit often. This is like a copy that can be easily accessed when needed. The next time a person accesses a stored site location, the proxy server can use the cached copy of it instead of going all the way back out to the web for a new copy. When many people are trying to access the same high-use site at the same time, it can use cached copies in order to save on bandwidth and increase the network's overall performance.

Companies can also use proxy servers to set up a virtual private network (VPN). A VPN is a direct connection to the company's network that can be accessed by remote users. This allows these remote users to privately and securely access company resources no matter where they are.

Firewalls and Filtering

One vital function of proxy servers is to provide filtering and firewall services. A firewall is a network security device (either hardware or software) that monitors all incoming and outgoing traffic and decides whether to allow it based on certain security rules. This means that a proxy service can block a person from accessing a website based on different criteria, such as the IP address, keywords it contains, or content. Individuals can put up filtering services on their own computers to block inappropriate content from children, and businesses often use filtering services to make sure their employees only access certain kinds of websites while on the job.

Companies also use proxy servers to monitor employees' web activity by logging all the web addresses an employee visits. This helps cut down on cyber loafing, which is when an employee is wasting time on non-approved sites instead of doing work.

Finally, a proxy server can be used to access resources that would otherwise be blocked. Some countries restrict access to certain internet resources. A proxy server that masks your location can be used to get around these restrictions.

5.3.12 Use a Proxy Server (Demo Video) Transcript:

In this scenario, you need to connect a laptop to a proxy server. The proxy server will then serve as a gateway between users and the Internet, acting as a firewall and a web filter. To begin, right-click Start, then click Settings. Click Network & Internet. On the left pane, click Proxy. Under Manual proxy setup, turn on Use a proxy server. In the Address field, type proxy.corpnet.com. In the Port field, enter 9000. Then, click Save.

5.3.13 Use a Proxy Server (Simulation) Scenario

You are the IT administrator for a small corporate network. You need to configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet.

In this lab, your task is to configure the proxy server settings as follows:

• Address: proxy.corpnet.com


• Port: 9000


Explanation

In this lab, your task is to configure the proxy server settings as follows:

• Address: proxy.corpnet.com


• Port: 9000


Complete this lab as follows:

1. From Start, select the Settings app.

2. Select Network & Internet .


3. On the left side of the window, select Proxy .


4. Under Manual proxy setup, toggle the Use a proxy server option to On .


5. In the Address field, enter proxy.corpnet.com .


6. In the Port field, enter 9000 .


7. Click Save .


5.3.14 Section Quiz (Section Quiz) q_itf_navigation_application

Which type of software is the Microsoft Edge web browser? Answers:

• *Application software


• Operating system


• Command line interface


• System software


Explanation:

Application software is designed specifically for the end user and includes video games, web browsers (such as Microsoft Edge), database programs, and word processors.

An operating system (OS) is a computer program that makes it so people, hardware, and software can interface with each other in a meaningful way. A web browser is not an OS.

A command line interface allows a user to interact with a computer by displaying text on a screen and accepting input from the keyboard (such as commands). A web browser is not a command line interface.

System software controls computer hardware and coordinates the interaction between hardware and application software. A web browser is not designed to control computer hardware or the interaction between hardware and application software.

q_itf_navigation_disable

While editing a report in Google Docs, April receives a web browser error message that there's a conflict with a Google add-on that she frequently uses. Which of the following is the BEST solution for April to resolve the error message issue and continue editing the report?

Answers:

• Remove the add-on and then continue editing.


• Switch to another web browser.


• Open the report in another web browser instance using a bookmark.


• *Disable the add-on while editing the report.


Explanation:

Disabling an add-on temporarily stops the add-on from functioning, but it can then be easily enabled or turned back on. April could then continue editing the report and enable the add-on again after finishing the editing.

Removing the add-on would also resolve the error message issue. However, April uses the Google add-on for other

purposes, and it would not be available unless she re-installs it. Disabling the add-on is the best solution.

Switching to another web browser could resolve the error message issue, as the add-on might not be installed on that web browser. However, simply disabling the add-on on the current browser is the best solution.

Opening the report in another web browser instance (even if it's bookmarked) would not resolve the issue of a conflict with a Google add-on.

q_itf_navigation_facts_01

Which of the following lines will initiate an Internet search from the address bar of a web browser? Answers:

• *microsoft gov


• microsoft.org


• testout.com


• microsoft.com


Explanation:

Typing anything that isn't a valid website into the URL bar of a modern web browser will run an Internet search on the browser's default search engine.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf_navigation_facts_02

Clickable text or images that take you to different sites on the World Wide Web are called        . Answers:

• *Hyperlinks


• Navigation buttons


• Shortcuts


• Attachments


Explanation:

The World Wide Web is a vast number of hypertext documents connected to each other through the Internet. Clickable text or images that direct you to another hypertext document are called hyperlinks.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_navigation_remove

Katy has uninstalled a photo editing application, but an icon still appears on her web browser for the application. Which of the following is the BEST solution for getting rid of the icon?

Answers:

• Disable the application add-on in the web browser.


• Re-install and then uninstall the application.


• Clear browsing data and launch a new instance of the browser.


• *Remove the application add-on in the web browser.


Explanation:

When installing an application, the installation program might also install an add-on to the default web browser to extend

its functionality. However, uninstalling the application might not remove the add-on. The best solution is for Katy to simply remove the add-on from the web browser to complete the uninstall process.

Katy could disable the application add-on in the web browser, but because she's uninstalled the application, the best solution is to remove the add-on from the web browser.

If the add-on was not removed from the web browser during the first uninstall, then re-installing and uninstalling the application a second time will not resolve the issue.

Clearing browsing data clears items such as browser history, cookies, and cache. However, it does not remove add-ons and would not solve the issue with the icon displayed in the web browser.

q_itf_navigation_search_01

Emily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi.

Which of the following search phrases will help her find exactly what she needs? Answers:

• *"Mississippi pecan pie"


• +Mississippi pecan pie


• Mississippi OR pecan pie


• -Mississippi pecan pie


Explanation:

Using double quotation marks (") around a search phrase tells the search engine to find an exact match.

Putting a plus sign (+) in front of a word tells the search engine that at least that word must be found exactly as you typed it. +Mississippi pecan pie could return an exact match, but it could also return other types of pecan pie (such as "Southern").

Placing an OR in a search phrase tells the search engine to find either of the words. Mississippi OR pecan pie could return a recipe for pecan pie, but it could also return information on the Mississippi river or Mississippi state.

Putting a minus sign (-) in front of a word tells the search engine to exclude that word from the search. -Mississippi pecan pie could return a recipe for pecan pie, but it would not be "Mississippi" pecan pie. q_itf_navigation_search_02

Dan is using Search on his web browser to find Clearwater Beach, which could be in Alabama or Florida. Which of the following search phrases would help Dan find the beach location MOST effectively?

Answers:

• *"Clearwater Beach" Alabama OR Florida


• "Clearwater Beach" Alabama +Florida


• Clear* Beach Alabama OR Florida


• "Clearwater Beach Alabama +Florida"


Explanation:

"Clearwater Beach" tells the search engine to find an exact match for the beach name, while OR tells the search engine that it could be in Alabama or Florida. This search phrase would be the most effective in finding the beach location. "Clearwater Beach" tells the search engine to find an exact match for the beach name, while putting + in front of Florida tells the search engine to find the word exactly the way you typed it. This search phrase is not effective and could list links to all kinds of attractions in Florida.

Using an asterisk (*) with Clear could list any URL that has "clear" in its content, which would not help in finding Clearwater Beach.

Enclosing the entire search string in double quotation marks tells the search engine to find an exact match for the phrase, "Clearwater Beach Alabama +Florida", which would be very ineffective for finding Clearwater Beach.

q_itf_browsers_compatibiltiy

You sign up for an online class at the local community college. The course is all web based. You open your favorite browser to enter the class portal, and you get a message "Use one of these browsers."

What is the problem?

Answers:

• *Browser compatibility.


• You typed the URL wrong.


• You need to make a secure connection.


• The class has not started yet.


Explanation:

Browser compatibility is the problem. Some websites and web applications can use custom features requiring a particular browser to open them properly or at all.

Typing the wrong URL will just ether time out, or take you do a site asking if you purchase that domain name. The compatibility error will happen before you get an opportunity to log in and make a secure connection.

Regardless of the class start time. The issue is with features in the site. q_itf_browsers_disable

You are vacationing at a friend's cabin on the lake and using the office computer to complete some work-related tasks using a web browser. The browser keeps slowing down after a few minutes of use. You check for extensions (add-ons) and notice that there are several listed.

Knowing that extensions can slow down a browser, what should you do to speed up the web browser processing time? Answers:

• Uninstall the web browser and re-install it.


• Uninstall several of the extensions.


• Remove several of the extensions.


• *Disable several of the extensions.


Explanation:

Because extensions can be temporarily disabled, you can disable several of the extensions and then enable them before you leave.

Uninstalling and re-installing the web browser removes all the extensions, which might be critical to your friend's browsing experience.

If you remove or uninstall several of the extensions, your friend might lose some critical web browsing features. q_itf_browsers_facts_01

A pop-up blocker is a web browser feature that            . Answers:

• *prevents unwanted advertisements


• keeps the window in a minimized state


• prevents color images from being displayed


• censors Internet searches

Explanation:

Pop-up blockers prevent some unwanted advertisements from appearing. However, they can also block helpful programs, such as the labs in this course. Because of this, pop-up blockers should be disabled on sites that use pop-ups for legitimate purposes.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf_browsers_facts_02

When might it be MOST helpful to clear your browser's cache of temporary Internet files? Answers:

• *When a website is not functioning as it should


• After every Internet search


• When you switch to a different web browser


• Immediately after opening a new Microsoft Office document


Explanation:

The browser cache stores temporary files that help previously-visited websites load faster. However, if these files become corrupted, they can make websites work incorrectly. Clearing the cache is a good troubleshooting step when trying to get a website or web app to work.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf_browsers_facts_03

Small files that a website saves on your computer to remember your preferences are called          . Answers:

• *Cookies


• Fingerprints


• Malware


• Reminders


Explanation:

Cookies are small files that a website saves on your computer to remember your preferences. Cookies are also small sweet cakes that are typically round and can be eaten with milk.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_browsers_facts_04

Web browsers save website information in their       , which helps the site load faster on future visits. Answers:

• *Cache


• Repository


• Storage


• Memory


Explanation:

The browser cache is a repository of temporary files which help websites load faster once they've already been visited. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_browsers_facts_05

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research.

Which of the following is the MOST likely cause of this problem? Answers:

• *A proxy server is filtering access to websites.


• A firewall is blocking ports 80 and 443.


• The router has not been configured to perform port forwarding.


• Port triggering is redirecting traffic to the wrong IP address.


Explanation:

A proxy server can be configured to block Internet access based on website or URL. Many schools and public networks use proxy servers to prevent access to websites with objectionable content. Ports 80 and 443 are used by HTTP to retrieve all Web content. If a firewall were blocking these ports, access would be denied to all websites. Port forwarding directs incoming connections to a host on the private network. Port triggering dynamically opens firewall ports based on applications that initiate contact from the private network.

q_itf_browsers_facts_06

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?

Answers:

• Apply a firmware update.


• Disable the pop-up blocker.


• *Configure the browser proxy settings.


• Clear the browser cache.


Explanation:

A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. In a scenario where a user cannot access specific websites, proxy settings may very well be the problem.

A pop-up blocker is a feature of most web browsers that prevents pop-up windows such as advertisements from being displayed. In this scenario, the pop-up blocker would not be blocking all websites except the company intranet.

Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to clear the browser's cache, which includes local copies of downloaded website content. In this scenario, it is highly unlikely that the cache would preventing a wide range of websites from displaying.

When installing a wireless router, it is good practice to make sure you have installed the latest firmware updates. However, out-of-date firmware would most likely not prevent non-intranet websites from displaying on a user's computer.

q_itf_browsers_facts_07

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

Answers:

• *Proxy settings

• Private browsing


• Invalid certificate


• Browser cache


Explanation:

A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. In a scenario where a user cannot access specific websites, proxy settings may very well be the problem.

Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to clear the browser's cache, which includes local copies of downloaded website content. In this scenario, it is highly unlikely that the cache would be preventing a wide range of websites from displaying.

Ecommerce and other websites that handle sensitive information should be certified to indicate they are using a valid digital certificate. However, invalid certificates would not prevent websites from displaying.

If you share your computer with someone else and don't want your browser to track your browsing activity, you can open a private browsing window. Private browsing would not prevent you from connecting to specific websites. q_itf_browsers_facts_08

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?

Answers:

• *Change browser settings to notify before downloading.


• Change browser settings to block third-party cookies.


• Change browser settings to prevent pop-up windows.


• Change browser settings to notify when downloads are complete.


Explanation:

Some malicious websites can download and install unwanted applications or malware without asking permission. One of the best ways to prevent this from happening is to make sure your browser will ask where to save files before downloading.

Blocking third-party cookies and pop-up windows are good practices, but they will not prevent malicious sites from downloading files.

q_itf_browsers_invalid

Christopher is surfing the web and sees an amazing offer for a product he's interested in. He clicks the link and begins the process of purchasing the item. While he is proceeding with the purchase, he notices that the address bar is a maroon color.

Should he proceed with putting in private information and purchasing the item from this site? Answers:

• *No, the maroon color indicates an invalid certificate.


• Yes, maroon means a pending certificate.


• Yes, maroon is a trusted certificate.


• No, he needs to create a user account first.


Explanation:

Maroon is an indicator of an invalid certificate. You should be careful in this situation. Your browser will ask you if you

want to continue even though this is a potential security risk.

A green color in the address bar is a highly trusted certificate, not maroon.

The color of the address bar has nothing to do with creating a user account. Some sites do not require establishing an account before inputting personal information. Just be aware of the padlock.

q_itf_browsers_padlock

Which of the following indicates that a website is using a valid digital certificate to secure the website and encrypt data? Answers:

• The URL starts with "https" instead of "http".


• There are no pop-up windows that appear when you access the website.


• *A padlock symbol is displayed to the left of the URL in the address bar.


• The web browser is updated to the latest version.


Explanation:

To determine whether a website is using a certificate for security and data encryption, look for the padlock symbol in the address bar (sometimes green, but mostly gray).

A URL that starts with "https" does not guarantee that a website is safe or necessarily using a valid digital certificate. Blocked pop-up windows are not an indicator that a website is using a valid digital certificate.

Updating a web browser has no impact on whether or not a website is using a valid digital certificate. q_itf_browsers_pop-up

Julie, a marketing researcher, uses her browser frequently to gather data from a variety of websites. Because many of these websites include pop-windows that can be annoying, Julie has set her pop-up blocker to block all pop-up windows. However, there are pop-up windows for a critical marketing research website that Julie needs to have displayed.

What is the BEST solution to make sure the marketing research website pop-up windows are not blocked? Answers:

• Install another web browser and only use it for the marketing research website.


• Use another marketing research website that does not have pop-up windows.


• *Add a pop-up blocker exception for the marketing research website.


• Deselect the Block Pop-Up Windows option in the web browser.


Explanation:

Adding a pop-up blocker exception for the marketing research website is the best solution. The pop-up windows for the website will still be available, while all other pop-up windows will be blocked.

While Julie could install another web browser to use exclusively for the marketing research website, this would not necessarily protect her from malware pop-up windows.

Using another marketing research website does not solve the issue of allowing pop-up windows for the one she currently needs.

Deselecting the Block Pop-Up Windows option will continue to allow pop-up windows for all websites, which is the issue Julie is trying to solve.

q_itf_browsers_script

Which of the following provides the ability to control which websites can run client-side scripting in your web browser? Answers:

• Web browser script deactivation


• Network proxy server


• Web browser cache

• *Script blocker add-on


Explanation:

For greater control over the websites that can run client-side scripts in your web browser, you can install a script blocker add-on for the browser.

You can deactivate client-side scripting in some web browsers, but this disables the feature for all websites (not selected websites).

A proxy server is a device that stands between an application (like a web browser) and provides security by performing tasks such as acting as a firewall or preventing access to specific websites. However, it does not focus on providing the ability to control which websites can run client-side scripting.

A web browser cache is the storage location for images, sounds, web pages, and other information associated with a website. It does not provide the ability to control which websites can run client-side scripting. q_itf_browsers_trusted

Christian has logged onto his bank's website. He wants to pay some bills electronically and transfer funds to his savings account. He checks to see if the padlock icon is visible in the address bar. The padlock is there, and it is green. What does that indicate?

Answers:

• *A highly trusted certificate.


• The green color has no meaning.


• The certificate is pending, but you should trust it anyway.


• You should not trust a green padlock.


Explanation:

The green padlock means the certificate for this site is highly trusted. To get a high assurance certificate, the website owner must go through a more rigorous validation procedure.

The green color having no meaning is incorrect. It is a valued indicator.

Either there is a valid certificate or an invalid certificate. There is no pending indicator. Even if there were, it would not be advisable to trust it.

You should feel good about doing business with a site that has a green padlock.

5.4 Cloud Computing Section Introduction

As you study this section, keep the following questions in mind:

• What do we really mean when we talk about "the cloud"?


• What cloud services do I already use?


• How can cloud computing help businesses?


After finishing this section, you should be able to:

• Define and describe the uses of cloud computing.


• Copy files from the local Windows file system to OneDrive.


• Explain the relationship between cloud computing and Software as a Service (SaaS).


• Discuss the features of cloud computing business solutions, including Microsoft Azure, Google Cloud, and Amazon Web Services.

Key terms for this section include the following:

Term Definition


Cloud Computing

The use of remote services hosted on the internet to store, manage, and process data.


Cloud Storage

A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.


Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.


Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.


Cloud Hosting

A method of delivering applications by hosting them in the cloud.


Microsoft OneDrive

A cloud storage service that is offered by Microsoft.


5.4.1 Cloud Computing (Lesson Video) Transcript:

After taking pictures with your smartphone, you've probably considered backing up or synchronizing them "to the cloud." That way if your phone gets lost or damaged you won't lose the photos. When you're assigned a team project for school or work, you might store shared documents "on the cloud." This allows everyone on your team to edit the documents at the same time from any location. Web applications such as Google Docs and Office 365 provide collaboration tools specifically designed for the cloud. So what is the cloud? In this video, we'll sort out some of the concepts associated with cloud computing.

At the most basic level, "the cloud" simply refers to a service that's running somewhere out on the Internet. For example, if you're storing files on the cloud, one of the services you need is a Web application that lets you upload and download the files. The Web app keeps track of your files and gives you immediate access when you need them. So why don't we just use the terms Internet or the Web instead of the cloud?

To answer this question, let's review a little history. After the Web was invented in 1989, it was used primarily to display static content such as text and images within a web browser. Eventually, the Web moved beyond its original function with more dynamic and interactive content, such as blogs, wikis, social media sites, and sophisticated Web applications. In the early 2000's, some people used the term Web 2.0 to refer to the expanded functionality of the Web. In 2006, Google and then Amazon started to use the term cloud to describe their products and services. They chose the term because on network diagrams the Internet is typically represented by a cloud.

So the cloud refers to data, applications, and other services running on the Internet, typically accessed through the Web. Cloud storage is a remote service available through the Internet. Examples include Apple iCloud, Microsoft OneDrive, Google Drive, and Dropbox.

But as we've noted, the cloud is much more than a repository for files. Cloud computing includes Web apps such as Google's Gmail, social media sites like Facebook and Twitter, and gaming services like Xbox Live and PlayStation Network. In addition to displaying Web content, these services maintain large databases and powerful collaboration tools. Most cloud-based applications require no installation. All you need is a Web browser and a username and login.

The cloud computing examples we've discussed so far are mostly consumer-based. But Amazon, Google, Microsoft, and other vendors offer enterprise solutions to help businesses expand their networking hardware and data storage capabilities. Cloud hosting solutions let corporations pay only for what they use, instead of having to buy all the necessary hardware themselves. Businesses essentially rent access to high-performance hard drives and other computing resources within large data centers.

In summary, here are four benefits of cloud computing:

* Number one: Backup. The cloud provides reliable backup solutions that mean you won't ever lose your data when a local storage device fails.

* Number two: Accessibility. The cloud gives you access to your data from any device and from any location. All you need is the right app and an Internet connection.

* Number three: Collaboration. Cloud-based applications give you the ability to share documents and collaborate with other people in creating and editing them.

* Number four: Resource Pooling. Many businesses want to expand their computing resources without having to purchase and maintain additional in-house hardware. For these companies, low-cost cloud hosting solutions are a great option.

There are, of course, some drawbacks to cloud computing.

* Number one: Privacy and Security Concerns. Data files stored on the cloud are susceptible to hackers, who gain access to cloud storage devices or tap into data as it travels over the Internet between your local device and the cloud.

* Number two: Internet Connection Issues. While storing your data on the cloud is a huge benefit when you need access from multiple devices, it's a big problem when your Internet connection goes down. Without a local copy of files, your productivity may be completely dependent on the quality of your Internet connection.

* Number three: Cloud Hosting Outages. Even if your Internet is up and running, you may be unable to access your files when the cloud service is down. Google, Amazon, Microsoft, and other cloud hosting businesses work hard to avoid any downtime, but there will always be short periods of hardware or software failure. For this reason, you should keep an offline copy of any critically important files or applications.

Despite legitimate concerns regarding data privacy and security, cloud computing has become almost indispensable for both consumers and large corporations. The cloud provides reliable services for backing up data, accessing files from multiple devices, and collaborating online with friends and business colleagues. In short, it makes the Internet a more useful place.

5.4.2 Cloud Computing Facts

Cloud computing is using hardware and software, accessed over the internet, to do computing tasks or run programs. Common uses of cloud technology include file storage, website hosting, web applications, social media, and gaming services.

A few examples of cloud computing includes Microsoft's OneDrive and Dropbox (Dropbox, Inc). Both are offered as a paid subscription and allow you to store and retrieve files from the cloud.

The following two tables summarize some of the benefits and drawbacks of cloud computing. Table 1: Benefits of Cloud Computing

BENEFIT DISCUSSION


Backup

The cloud provides reliable backup solutions. That means you won't lose data when a local storage device fails.


Accessibility

The cloud gives you access to your data on any device and from any location. All you need is the right application and an internet connection.


Collaboration

Cloud-based applications give you the ability to share documents and collaborate with other people in creating and editing documents.


Resource pooling

Many businesses want to expand their computing resources without having to purchase and maintain additional in-house

hardware. For these companies, low-cost cloud hosting solutions are a great option.


Table 2: Drawbacks of Cloud Computing DRAWBACK

DISCUSSION


Privacy and security concerns

Data files stored on the cloud are susceptible to hackers, who gain access to cloud storage devices or capture data as it travels over the internet between the local device and the cloud. Nearly all cloud service providers use encryption for this reason.


Internet connection issues

While storing data on the cloud is a benefit when you need access from multiple devices, it's a problem when the internet connection goes down. Without a local copy of files, your productivity may be completely dependent on the quality of your internet connection.


Cloud hosting outages

Even if the internet is up and running, you may be unable to access the files when the cloud service is down. Google, Amazon, Microsoft, and other cloud hosting businesses work hard to avoid any downtime, but there will always be short periods of hardware or software failure. For this reason, you should keep an offline copy of any critically important files or applications.


Cost

Although some cloud computing or storage is offered for free with limited features (such as Microsoft's OneDrive and Google Drive), most require a subscription or purchase. The cost for the services will vary depending on the service and amount of data stored.


5.4.3 Software as a Service

One of the main categories of cloud computing is a branch known as software as a service (SaaS). It is also referred to as cloud-hosted applications. This is where a company offers a subscription to use a particular piece of software delivered over the internet.

This model differs from the traditional delivery method that allows users to buy and install a perpetual license. It's popular and is used by major companies like Microsoft, Adobe, and Intuit. SaaS is used for email applications, customer relationship management (CRM) software, financial management, and human resources (HR) programs.

Cloud Computing


Arrows pointing between a cloud and different computer devices. Illustration.

Cloud computing has been a revolutionary shift in the way that individuals and companies operate. Instead of storing everything locally on each individual machine, cloud computing allows you to do much of your work and storage over the internet. Things that are stored and shared in this way are said to be in the cloud.

There are many advantages to this method of software usage, including the following:

• Lower costs - With cloud computing, you pay only for the services you need as long as you need them. This can lead to lower overhead costs for things such as maintenance and electricity.


• Greater speed - When much of the work is done in the cloud, more computing power can be put toward each task. This means that processes generally run faster.


• Easier collaboration - With cloud computing, it's simple for people to work together even when they're not geographically close.

• Data backup - If files are kept in the cloud, it's easier to make sure that you don't lose them. Even if your individual machine crashes, files can be restored from a cloud location.


• Data Security - Cloud computing has many technologies that help protect your data so that only authorized individuals can access it.


The SaaS Model


Software enclosed in a cloud with arrows pointing from cloud to other computer devices. Illustration.

In a typical SaaS model, the software is hosted on a central server and users are charged a monthly fee to gain access to it. Under this model, the end user doesn't need a license because everything is hosted in the cloud. The end user also doesn't need any particular kind of hardware to host the software as it's taken care of by the host company.

Many companies like this business model because it creates a steady stream of monthly revenue. Since the customer is only renting the software, access can be revoked if the customer stop paying. This is in contrast to traditional software, which is purchased for a one-time fee.

Categories of SaaS Applications

The following are categories of SaaS applications you may encounter:

• CRM management software such as Salesforce.


• Office tools such as Microsoft Office 365 (Word, Excel, and PowerPoint).


• Online storage solutions such as Dropbox, Google Drive, and Microsoft OneDrive.


• Customer service software such as Zendesk.


• Electronic signature and document management software such as DocuSign.


• Real-time messaging solutions such as Slack.


• Virtual meeting solutions such as GoToMeeting and Zoom.


• HR tools such as Workday.


• Course management tools such as Blackboard.


• Survey creation tools such as Qualtrics.


• Email services such as Gmail, HubSot, and Sendinblue.


5.4.4 Cloud Computing Business Solutions

Modern businesses are always looking for ways to make their processes more efficient, and cloud computing solutions are a way to do just that. With cloud computing, everything is done through the internet. Apps are distributed and run, data is stored, and other services are provided without having to dedicate space on local physical computers. This helps businesses reduce overhead costs created by running too many computers. These kinds of platforms also provide more security and flexibility than their traditional counterparts.

There are many cloud computing solutions available today with more being created all the time. Several companies offer broad cloud computing suites that provide a variety of services for their clients. These include Microsoft Azure, Google Cloud, and Amazon Web Services (AWS).

Currently, there is very little standardization between cloud services, meaning that no two providers offer the exact service in the same way. This can make it difficult for a business to use more than one cloud service provider at once. Microsoft Azure

Microsoft Azure logo.

Microsoft Azure (formerly Windows Azure) is Microsoft's cloud computing business solution that's been operational since 2010. It encompasses a growing library of web-based business solutions. It also supports a wide variety of programming languages and both Windows and Linux operating systems. In order to keep all their services running, Microsoft has built data centers all across the world that provide services to more than 140 countries.

Azure operates on a pay-as-you-go pricing model, which means you only pay for the services you use when you use them. Some applications use multiple Azure services and therefore involve different pay scales. Microsoft also offers discounts when businesses purchase long-term contracts for certain services.

Some of Azure's services include the following:

• The ability to launch virtual machines that run both Linux or Windows. This is also known as providing Infrastructure as a Service (IaaS)


• An online environment to let developers easily create and manage websites. This is also known as providing a Platform as a Service (PaaS)


• Beta testing for mobile apps


• Cloud data storage


• Online messaging services


• Data analytics


• Monitoring and controlling devices on the Internet of Things (IoT)


• Machine learning services. (This term basically just means AI in almost all cases.)


• Data backup and disaster recovery


Google Cloud Google Cloud logo.

Google's cloud-based business solutions package, known as Google Cloud, has been available to the public since 2011. It also operates on a pay-as-you-go basis like Microsoft Azure. It offers discount tiers for sustained use, for customized use, and for committed use of its products. Its largest focus is to help businesses build and deploy software and is especially adept at handling complex applications with many intricate parts.

Google Cloud has large-scale (hyper-scale) data centers that allow you to use their immense computing power to get things done. Their cost model is set up differently from most competitors. Google charges you not for the machines themselves, but for the resources they use (bandwidth and processing power) per second. This option is best for those who need a long-term operating solution.

Google Cloud currently provides over 90 different products as part of the brand, including the following:

• Cloud storage


• Cloud databases


• Virtual private clouds for organizations


• Data analytics


• Online text analysis


• Cloud speech to text and vice versa

• Online management tools


• Online security tools


• Management of IoT devices


Amazon Web Services Amazon Web Services logo.

Amazon's cloud-based services platform, Amazon Web Services (AWS), has been around since 2006. Its services are also pay as you go and don't require any upfront costs. It can interface with any programming language or operating system.

AWS breaks its services down into essential cloud services (virtual machines, cloud storage, application deployment, etc.) and optional support services.

AWS offers the following and more:

• Hosting applications including SaaS programs


• Virtual machines that can be customized to be computer-optimized, memory-optimized, or storage-optimized machines


• Web hosting


• Data backup and storage, including long-term storage


• Delivering content to end users


• Providing database solutions


• Transcription and translation services


• IoT control


• Artificial Intelligence (AI) services


• Augmented Reality (AR) and Virtual Reality (VR) services


• Game development services


5.4.5 Windows Cloud Storage (Lesson Video) Transcript:

Cloud storage allows you to save your files to the Internet instead of saving them on a local storage device. There are many different cloud storage vendors. In this lesson, we're going to focus on the OneDrive feature that's available for Windows workstations.

OneDrive is Microsoft's Cloud storage service. OneDrive requires you to first have an account with Microsoft. If you don't already have one, you can register for one at no cost by visiting signup.live.com.

When you sign into OneDrive using your Microsoft username and password, you can store files and folders from your local system into your OneDrive account. Then, if you sign into OneDrive again from a different computer, all of the files you stored in OneDrive are available on that computer as well. Using OneDrive makes it unnecessary for you to email files to yourself or to copy files to external storage devices to move them between systems.

On older Windows systems such as Windows 7, you have to first download and install the OneDrive software from Microsoft's website. Windows 8 and later have the OneDrive software already integrated into the operating system itself, so you don't need to install anything to use it.

To access your OneDrive storage on Windows 10, open the Start menu and click File Explorer. In the left pane, select

OneDrive. From here, you can see the folders that have been created and the files that have been saved in your OneDrive account. For example, we can right-click this file and edit it with Microsoft Paint.

If we were to make changes to this file and then save it, it would be saved over the Internet to this OneDrive account, which resides on a server somewhere at Microsoft. With the OneDrive software integrated into the operating system, you can access your OneDrive account from within applications running on your local computer. For example, we can save documents created in Microsoft Word directly to OneDrive. With a document open, click File > Save As, and OneDrive. From here, select the Documents folder. Now you can give the file a name and click Save. This file is saved over the Internet to OneDrive. If we look at the Documents folder in the OneDrive account, we can see the file we just created in Word. If we switch over to a different computer and log into OneDrive using the same Microsoft account, we see the file we just created in the Documents folder. If needed, we could open this file in Word from this computer, make changes to the file, and save the changes back to the OneDrive account.

Files saved on your OneDrive account are also accessible from a web browser. In the Notification area of the Taskbar, right-click the OneDrive icon and select 'View online'. Here you can access the files in your OneDrive account from within a web browser. Because we're using Office, we can open the files in OneDrive using Office Online. For example, we can open this Word file by selecting it. The file is opened in the online version of Word. We can edit the file by clicking Edit Document, then Edit in Browser. We can also create new files using Office Online. For example, to create a new Excel spreadsheet, click New, then Excel Workbook. After returning to OneDrive, we can see that the file is added to my OneDrive account. Notice that there is an option to upload files from the local system to my OneDrive account.

We can also manage files in my OneDrive account. For example, to delete a file that isn't needed anymore, mark the file to be deleted, then click Delete. Any changes made in the web browser are immediately saved to OneDrive.

In this lesson, we discussed using OneDrive as Cloud storage. Files added to a OneDrive account are accessible from any other computer, as long as you log in using the same username and password. A OneDrive account can be accessed from within File Explorer or from within a web browser.

5.4.6 Windows Cloud Storage Facts

Cloud storage allows you to save your files to the internet instead of to a local storage device. There are many cloud storage vendors, such as Google Cloud Platform, Apple's iCloud, and Dropbox.

This lesson reviews Microsoft's Cloud storage service called OneDrive and peer-to-peer (P2P) file sharing. OneDrive Cloud Storage

To use OneDrive, you must first have an account with Microsoft. If you do not have an account, you can register for one (for free) by visiting https://signup.live.com/. Unlike some cloud-based storage systems, such as Dropbox, Windows 8 and later systems have the OneDrive client software installed by default.

After signing in to OneDrive, you can store files and folders in your OneDrive account. All of your OneDrive files remain available in your account, no matter what computer you access your account from.

Using OneDrive makes it unnecessary to email files to yourself or to copy files to external storage devices to move them between systems. By default all users get 5GB of free storage on OneDrive. Additional storage can be purchased.

Image 1: Microsoft OneDrive


Microsoft OneDrive selected in File Explorer. Screenshot. Table 1: Common OneDrive Management Tasks

TASK DESCRIPTION


Access OneDrive account

You can easily access your OneDrive storage on Windows 10 through File Explorer.

1. From the Start menu, click File Explorer .


2. On the left side of the window, select OneDrive .


The files and folders that have been saved in your OneDrive account are displayed. You can use File Explorer to create, delete, copy, or move your OneDrive files.

Open or save files in a OneDrive account

You can save files to your OneDrive account from within applications running on your local computer by doing the following:

1. Within the application, click File > Save As .


2. Select OneDrive and browse to the desired folder.


3. If necessary, give the file a name.


4. Click Save .


The file is saved over the internet to your OneDrive account. To open a file from your OneDrive account, do the following:

1. Within the application, click File > Open .


2. Select OneDrive .


3. Browse and select the file, and then click Open .


Open or save Microsoft Office Files in OneDrive account

Microsoft Office applications are integrated with the OneDrive cloud storage service, allowing you to open files from or save files directly to your account. To save a file to your OneDrive account from within an Office application, do the following:

1. Within the Office application, click File > Save As .


2. Click OneDrive and browse to the desired folder.


3. If necessary, give the file a name.


4. Click Save .


To open a file in an Office application, do the following:

1. Within the Office application, click File > Open .


2. Click OneDrive .


3. Browse and select the file, then click Open .


Access OneDrive account in a browser

Your OneDrive account is accessible from a web browser. This allows you to access your information from computers that don't have the OneDrive client software installed. You can access your OneDrive account through a browser by completing the following steps:

1. Open a web browser and access OneDrive.com.


Once done, you can access the files in your OneDrive account in a browser window.


Peer-to-Peer File Sharing

File sharing can usually be accomplished more efficiently using the cloud. You can do this using a process known as peer-to-peer sharing. This is done by installing peer-to-peer software (such as Gnutella, Xunlei, Bittorrent, etc.) and using it to locate and share the desired files.

As you set up your file sharing software, you can determine how much disk storage to allocate to this service. In some cases, files can be split and retrieved from several sources and rebuilt during the download process.

5.4.7 Copy Files to OneDrive (Demo Video) Transcript:

In this scenario, you want to copy a document from your local system to cloud storage. This way, you can access the document from any computer with an Internet connection.

First, we'll find the file you want to copy. Open file explorer, then go to Documents. Right-click the file and select Copy. Next, navigate to your cloud storage folder. On this system, you can get there by clicking OneDrive in the left pane.

Open the documents folder, right-click, and select Paste. When this symbol turns into a green checkmark, it means the file has been saved on one of Microsoft's servers.

5.4.8 Copy Files to OneDrive (Simulation) Scenario

You are working on a research paper that is due soon in your Latin 101 class. You've been using your desktop system in your dorm room to write the document. However, you need to do some additional research in the library and in the Latin computer lab in order to complete the paper. To do this, you need to be able to work on the document no matter where you are or what computer system you are using. In other words, you need to copy the document to cloud storage.

In this lab, you need to copy the ipsum.docx file from the Documents folder on your desktop system to the Documents folder within your Microsoft OneDrive account.

Explanation

To complete this lab, do the following:

1. At the bottom of the screen, click the File Explorer icon.


2. In the File Explorer window, in the right pane double-click the Documents folder.


3. Right-click the ipsum.docx file and select Copy .


4. To navigate to the destination folder, scroll up in the Navigation pane and select OneDrive .


5. In the right pane double-click the Documents folder within OneDrive.


6. Right-click anywhere within the Documents folder, then click Paste .


5.4.9 Section Quiz (Section Quiz) q_itf2_cloud_01

What do cloud services provide to help with privacy and security concerns? Answers:

• *Encryption


• Backups


• Accessibility


Explanation:

Data files stored on the cloud are susceptible to hackers who gain access to cloud storage devices or tap into data as it travels over the internet between your local device and the cloud. Nearly all cloud service providers use encryption for this reason.

The cloud provides reliable backup solutions that mean you won't lose your data when a local storage device fails. The cloud gives you access to your data on any device and from any location. All you need is the right application and an internet connection.

Cloud-based applications give you the ability to share documents and collaborate with other people to create and edit them.

q_itf2_cloud_hosted

Frank has worked for an insurance company for many years. The applications Frank uses are kept on local servers in the office building. Frank's company wants to save on costs and wants to have employees work from home.Which solution can Frank's company use to allow its employees to access the applications they need from anywhere and save on costs? Answers:

• *Move the applications to a cloud-hosted model.


• Pay a software company to redesign all their apps and host them for Frank's company.


• Put the applications on laptops and send the employees home with them.


• There is no solution that accomplishes both.


Explanation:

Most companies are taking advantage of cloud-hosted models to allow remote access to applications. The drawback is that the client and cloud service must have reliable internet connections.

Paying a company to design a turnkey cloud-based solution is also possible, but the key is that Frank is trying to save money. He already has the server applications; they are just moving them to a cloud hosting company.

Placing the applications on laptops is not a good option because it lacks the ability to share or back up information, and there are security risks.

Before the internet, there would not have been a solution that accomplishes both goals. q_itf_cloud_comput_facts_01

       computing refers to services and applications that run remotely over the Internet. Answers:

• *Cloud


• Global


• Remote


• Virtual


Explanation:

Cloud computing is the term used to refer to remote services hosted on the Internet to store, manage, and process data. q_itf_cloud_comput_facts_02

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) Answers:

• Microsoft Word


• *Google Drive

• Adobe Photoshop


• *Dropbox


• Adobe Acrobat Reader


Explanation:

Google Drive is a cloud-based file storage and synchronization service developed by Google that runs from the cloud. Dropbox is a file hosting service that is cloud-based and offers cloud storage, file synchronization, personal cloud, and client software.

Microsoft Word is a word processing application that can run entirely on a local computer without using resources from the internet.

Adobe Photoshop is a raster graphics editor that can run entirely on a local computer without using resources from the internet.

Adobe Acrobat Reader is software that lets you view and modify PDF files. It can run on a local computer without using resources from the internet.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf_cloud_comput_facts_03

Which digital communication medium consists of top-level posts with threads of response posts? Answers:

• *Discussion board


• Chat room


• Email client


• Social network


Explanation:

Discussion boards consist of a top-level or original post and comment threads that reply to the OP. Reddit, Quora, and Stack Exchange are popular discussion boards.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf2_saas_01

Which of the following are advantages of cloud computing? (Select two.) Answers:

• Greater costs


• *Easier collaboration


• Lower speeds


• *Data security


• Local software


Explanation:

Cloud computing has been a revolutionary shift in the way that individuals and companies operate. Instead of storing everything locally on each individual machine, cloud computing allows you to do much of your work and storage over

the internet. Things that are stored and shared over the internet are said to be in the cloud. There are many advantages to this way of doing things, including the following:

• Lower costs


• Greater speeds


• Easier collaboration


• Data backup


• Data security


q_itf2_saas_02

Which of the following is a category of SaaS applications? Answers:

• *Office tools


• Disaster recovery


• Virtual machines


• Web hosting


Explanation:

The following are other categories of Software as a Service (SaaS) applications that you will see.

• Email and productivity providers such as Google Apps


• Customer relations management (CRM) software such as Salesforce


• Office tools like Microsoft Office 365


• Online storage solutions such as Dropbox


• Customer service software such as Zendesk


• Electronic signature and document management software like DocuSign


• Real-time messaging solutions such as Slack


• Virtual meeting solutions such as GoToMeeting


• Human resource tools like Workday


• Course management tools such as Blackboard


• Survey-creation tools such as SurveyMonkey


q_itf2_cloudbusiness_01

What is the term for delivering an application over the internet called? Answers:

• IaaS

• *SaaS


• PaaS


• FaaS


Explanation:

One of the main categories of cloud computing is a branch known as Software as a Service (SaaS). This is a system in which a company offers customers a subscription to use a particular piece of software which they deliver over the internet.

Infrastructure as a Service (IaaS) is the ability to launch virtual machines that run both Linux and Windows. Platform as a Service (PaaS) is an online environment that lets developers easily create and manage websites.

Google Cloud currently provides over 90 different products as part of their brand. One of these is Function as a Service (FaaS), which allows a company to incorporate functional pieces of code or modules without a server. q_itf2_cloudbusiness_02

Which of the following charges resources used, such as bandwidth and processing power, by the second? Answers:

• *Google Cloud


• Microsoft Azure


• Amazon Web Services (AWS)


• OneDrive


Explanation:

Google's cloud-based business-solutions package, known as Google Cloud, has been available to the public since 2011. It also operates on a pay-as-you-go basis, which means the more services a business uses, the more they pay.

Amazon's version of its cloud-based services platform, Amazon Web Services (AWS), has been around since 2006. Its services are pay as you go without asking for any upfront costs.

Microsoft Azure (formerly Windows Azure) is Microsoft's cloud computing business solution that has been operational since 2010. It encompasses a growing library of web-based business solutions. Businesses can pick and choose which of these services to purchase and use.

OneDrive is Microsoft's cloud-storage service. OneDrive requires you to first have an account with Microsoft. q_itf_cloudstorage_facts_02

Microsoft OneDrive is a cloud solution that is designed to provide which of the following? Answers:

• *Cloud storage


• Cloud computing


• Cloud hosting


• Resource pooling


Explanation:

OneDrive is a Microsoft cloud storage service hosted on the internet that remotely maintains, manages, and backs up data and makes that data available to users over a network.

Cloud computing is the use of remote services (such as online banking or word processing) hosted on the internet to process data produced by the services. OneDrive is not a cloud computing service.

Cloud hosting is a method of delivering applications by hosting them in the cloud, but does not offer the cloud storage

features of OneDrive.

Resource pooling is a low-cost cloud hosting solution, while OneDrive is a cloud storage solution. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_cloudstorage_facts_03

A service that lets you store data in a remote location over the Internet is called          . Answers:

• *Cloud storage


• Internet backup


• Online repository


• Database


Explanation:

"The cloud" is another term for remote computers over the Internet. When you save something to "the cloud," you're really saving it to someone else's computer.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_cloudstorage_onedrive

Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropbox and OneDrive?

Answers:

• OneDrive is a cloud-based storage solution.


• *OneDrive is installed by default on Windows systems (after Windows 7).


• Dropbox is available as an Android application and an iPhone application.


• Dropbox is installed by default on Windows systems (starting with Windows 10).


Explanation:

On Windows 7 systems, you must first download and install the OneDrive client software from Microsoft's website. Windows 8 and later systems have the OneDrive client software installed by default.

Both OneDrive and Dropbox are cloud-based storage solutions.

Both OneDrive and Dropbox are available as smartphone apps on Android and iPhone. Dropbox has never been installed as a default application on Windows systems.

5.5 Social Media Section Introduction

As you study this section, keep the following questions in mind:

• How has social media helped society? How has it hurt society?


• How can I better use social media to reach my personal goals?


• Why is it important to cultivate a healthy online identity?


After finishing this section, you should be able to:

• Identify common web applications, including Webmail, Google Docs, Facebook, and YouTube.


• Define social media and describe its uses.

• Compare and contrast the uses of common social media platforms, including Facebook, Twitter, and Instagram.


• Recognize the risks and responsibilities of using social media.


• Explain why it is important to manage and protect your online identity.


• Create an effective social media profile.


• Describe the basics of social media marketing and crowdsourcing.


Key terms for this section include the following:

Term Definition


Social Media Platform

A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.


Crowdsourcing

A way of reaching out to a large group for help solving a problem. It can involve collecting ideas from users or professionals, or pooling money or resources from a variety of people.


Social Media Marketing

A marketing tool used on social media to present a business and its message quickly and in the best light possible with the intent to interact with and influence potential customers and expand their business potential.


5.5.1 Social Media (Lesson Video) Transcript:

If you use the Internet, you probably use social media. More than 80% of adults in the United States have at least one social media account, and that number continues to grow. There are dozens of social media applications, including Facebook, Instagram, LinkedIn, Twitter, Snapchat, and Pinterest – if you want to share a duckface selfie or a picture of your lunch, you have plenty of options. Since it's such a huge part of daily life for so many people, it's important for everyone to know the basics of social media.

Social media are technologies that help people share their lives with other people over the Internet. Generally, each user on a social media platform creates a unique profile with information about themselves. This information can include photographs, biographical information, work and education history, likes and dislikes, political ideology, religion, and much more. Then, using the social media site, they connect their profiles to the profiles of other people. Connected profiles can share content with each other, such as text posts, pictures, and videos. Since the web of connected profiles resembles a network, this is often called social networking.

Social media has many benefits, which is why so many people use it. The biggest is how easy it is to connect with people all over the world. Social media helps us keep in touch with friends and family who might otherwise lose contact. Since most news sources have a social media presence, it's a great way to get up-to-date information about current events. It also makes it easier to share details of your life with your friends.

That said, there are also many drawbacks to social media. Perhaps the biggest concern is privacy. Social Media apps may seem free, but they don't exist to provide free service – they exist to make money. Thanks to social media, companies have bought and sold private details about millions of people, which they use to target advertising and propaganda.

Another problem with social media is that it tends to exacerbate social divides. Many users unwittingly create echo chambers for themselves, where they hear only opinions and ideas they agree with. In many cases, this leads to

villainizing good people who happen to think differently. Some people even create and share sensationalized and false news stories to cause divisions and social unrest.

As a social media user, it's up to you to share and consume information wisely. You should assume that everything you put on social media will be made available to the public, regardless of privacy settings. Adding information like your phone number or physical address to a social media profile is rarely a wise choice. You should also be a critical consumer of information. Before sharing or responding to claims made on social media, verify the information is true by finding multiple sources that report the same thing. If something that makes you mad seems unbelievable, it probably is. A growing problem with social media is cyberbullying, which is using technology to intimidate, threaten, or abuse others. Anyone who uses the Internet or has a cell phone may be vulnerable to it. Cyberbullying can include posting embarrassing photos or videos on the Internet, harassment though text or instant messages, and spreading lies and rumors online. Cyberbullying leads to increased risk of anxiety, depression, and even suicide. It's crucial that you never take part in this nasty behavior nor support those who do.

If you are a victim or witness of cyberbullying, take the following suggestions by stopbullying.gov into consideration. First, do not participate by liking, sharing, commenting on, or forwarding these posts. This may limit the potential damage of the messages to victims and others. Second, do not retaliate or respond negatively to these posts. This only increases the potential to make the situation worse. Third, if you feel safe doing so, respond to the person who created the hurtful

content in a calm, clear, and constructive manner. This can be online, in a phone call, or in person. Fourth, follow up with the person who was targeted. By reaching out you can send a powerful message that you care about the person and don't support negative behaviors. While we can't control the actions of others, we should do our best to be good online citizens and encourage others to do the same.

We've just taken a short look at social media, including its benefits and drawbacks. We also learned about cyberbullying and talked about appropriate steps for responding to it.

5.5.2 Social Media Facts

Social media is a common way for people to interact with each other on the Internet. Users create accounts on social media platforms, then add information about themselves to their accounts such as pictures, videos, and biographical information. Then, they link their account to the accounts of other users on the platform. For example, Facebook users link their accounts together though friend requests. Once linked, each user can view anything the other posts to their account.

There are many different social media platforms. The following table introduces some of the most popular technologies. Table 1: Popular Social Media Platforms

PLATFORM DESCRIPTION


Facebook

Facebook is the world's most popular social networking platform. People use Facebook to share pictures, videos, and content from other websites. Additionally, Facebook is often used as a tool for both public and private conversations between users.


Twitter

Twitter allows users to post short messages, videos, and pictures, which can be viewed by other Twitter users. Twitter is commonly used by celebrities, politicians, and other high-profile figures as a means of reaching out to large numbers of followers at once.


LinkedIn

LinkedIn is an entire social network dedicated to the professional world. Employers often use LinkedIn to search for candidates for positions in their companies. Job seekers use it to communicate their skills and expertise to potential employers.


Instagram

Instagram is primarily for sharing photographs and videos with friends and followers. It is commonly installed on mobile devices, which can be used to take a picture and then immediately upload it to Instagram.

Social media has some obvious benefits in terms of its ability to connect and bring people together. However, it also comes with some risks. Consider the following precautions:

• The sense of anonymity provided by the Internet can lead some people to post obnoxious or harmful comments that they would never consider making in person. Avoid being a "troll."


• Take advantage of privacy settings on social media sites. This will protect your biographical and personal contact information from malicious users.


• Be wary of strangers who might be misrepresenting themselves and their motives for the purpose of scamming or misleading other people.


• Because it's extremely difficult to erase online information, be careful what you post. Creating a professional online presence is particularly important when you're interviewing for a job. Hiring managers will often investigate the postings of prospective employees. Protect and carefully monitor your digital identity, which includes your patterns of online interaction and anything you post about yourself on social media.


• If you have children, closely monitor their social media use. Children are often more trusting of strangers and more likely to share personal information that would make them vulnerable to predators.


A growing problem with social media is cyberbullying, the use of technology to intimidate, threaten, or abuse others. Anyone who uses the Internet or has a smartphone may be vulnerable to it. Cyberbullying can include posting embarrassing photos or videos on the Internet, harassing though text or instant messages, and spreading lies and rumors online. It can lead to an increased risk of anxiety, depression, and even suicide. It's important that you never take part in this nasty behavior or support those that do. If you are a victim or witness of cyberbullying, take the following suggestions by stopbullying.gov into consideration:

1. Do not participate by liking, sharing, commenting on or forwarding these posts. This may limit the potential damage of the messages to victims and others.


2. Do not retaliate or respond negatively to these posts. This only increases the potential to make the situation worse.


3. If you feel safe doing so, respond to the person who created the hurtful content in a calm, clear, and constructive manner.


4. Follow up with the person who was targeted. By doing this, you can send a powerful message that you care about the person and don't support negative behaviors.


5.5.3 Facebook, Twitter, and Instagram

Social networks allow people to stay connected to each other online through sharing text, pictures, and videos. Three of the major players in the social media world are Facebook, Twitter, and Instagram. Though they all foster connection and communication, each of these platforms has a different focus and employs different guidelines for their users.

Understanding these differences is the key to deciding which social networks best suit your needs.

Like most social media platforms, Facebook, Twitter, and Instagram are free to use. They make money by showing targeted advertisements based on data generated by users. For privacy reasons, it's important that you never put anything on a social media platform that you don't want to be widely distributed.

Facebook


Facebook logo.

Facebook is currently the largest social networking platform in the world, boasting 2.45 billion active monthly users. It was originally designed for college students, but now it can be accessed by anyone 13 years or older who has a valid email address. On Facebook, each user creates a profile about themselves. They then invite other users to be their "friends." Once users are friends, they can see each other's profiles and share text, images, and videos. They can also

communicate directly using Facebook's direct messaging service—Facebook Messenger.

Facebook has added a variety of features over the years, including live video streaming and the ability to create dedicated groups and pages for businesses or causes.

Facebook is so widely used that many websites have integrated with Facebook, allowing their users to sign into their website using their Facebook account. This streamlines the process and allows the website to draw information from the person's Facebook profile.

Twitter


Twitter logo.

Twitter is a microblogging platform. Users make public posts which can be viewed on their profile. The catch is that each post, or tweet, can only be up to 240 characters long. Each user can choose to "follow" other users whose content they wish to see. Posts from these users constitute each person's Twitter feed, which is displayed on the home page.

Users can also retweet their favorite tweets. This adds the tweet to their followers' feeds.

The quick, snappy nature of tweets make them easier to read on smaller screens, such as mobile devices. The constraint also forces users to distill their ideas to their most basic level. Academics, politicians, news outlets, and other influencers use Twitter to help get their messages out.

Instagram


Instagram logo.

Instagram is an image-sharing social network. Though it was acquired by Facebook in 2012, it remains a separate network that's more focused on photos. Unlike Facebook and Twitter, which allow users to upload content through a computer or mobile device, Instagram requires that new content be uploaded through a mobile app. Content that has already been uploaded can then be viewed on a computer.

Like Twitter, Instagram users create a profile which other people, also known as followers, can "follow." Users can like, comment, and bookmark other peoples' posts. It also contains a direct message feature to send private communication between friends.

Instagram is integrated with other social media sites. Photos can be shared from Instagram to other sites, such as Twitter and Facebook, with a single click. It also works well with businesses, who can create a free business account that allows them to track statistics related to their posts.

One defining feature of Instagram is its built-in photo editing tools. After uploading a photo, users can apply a variety of filters to change the look of the photo, such as making it black and white or in a sepia tone. Photos can be cropped and rearranged, and settings like brightness, saturation, and hue can be tweaked to create different effects.

5.5.4 Online Profiles and Identities


A boy and a girl protecting their ID cards from hands coming out of a social media site. Illustration

Social media can be an exciting way to share more about yourself and interact with new people. However, you do need to be cautious when configuring your own online identity and using it to interact with others online. The internet is full of people who use online profiles to misrepresent who they are for illegal or unethical purposes. Being a responsible online citizen is the best way to stay safe on social media.

Your Online Identity

Whenever you sign up for any form of social media or email, you're asked to complete a profile. Some parts of the profile are required while others are optional. You can provide as much or as little information as you'd like. When creating a profile, it's vital to understand that it's difficult to control who accesses your information once you've made it available. The more information you give out online, the higher potential there is for it to be misused.

The following kinds of information are often found on social media profiles:

• A profile picture (typically a picture of the person whose profile it is)


• A username (either a person's real name or a username of the user's choosing)


• Contact information (this can include email, phone numbers, mailing addresses, etc.)


• Personal information (this can include a person's real name, age, location, etc.)


• Profile (this is usually a paragraph that lets a person describe him or herself)

• Links (a person can list links to other websites or social media accounts)


Protecting Your Identity

Most social media platforms that require you to create a profile have privacy settings. These settings allow you to decide which groups of people are allowed to see your profile.

For example, on Facebook you can individually decide who gets to see various parts of your profile, such as your posts and personal information. You can set some things to the Everyone setting, which means that anyone on the internet can access your information. You can also set it to Friends, meaning only those with whom you are friends can see the information. You can also set it to Friends of Friends, which means that your friends and those who are friends with them are able to see your information. Finally, you can set it to Private/Only Me, which means that only you are able to see that information.

It's a good idea to keep your personal email and phone number only visible to close friends (or not to post them at all). You should never post your address. Making this information available increases the chances that it could be misused for spam, unwanted phone calls, or worse.

You can also set different privacy settings on each individual post. If a post reveals personal information, it's a good idea to restrict who can see it so that strangers can't tell too much about you.

Protecting Your Social Media Identity

There are many different internet security threats out there that you need to be aware of. These include the following: Hacked Social Media Accounts : If a hacker gets into your social media account, they can use it to send malicious messages, videos, and images to other people using your account. They may even try to create a copycat account that mimics your profile picture and username in order to trick other people into interacting with them. If this happens, report the fraudulent activity to the social network and change your password right away. It's important to choose a password that's strong, meaning that it's made up of a combination of lowercase letters, uppercase letters, numbers, and symbols. Misleading Profiles : One of the greatest threats of the internet is that it makes it easy for people to mask their true identities. Sometimes, people who want to hurt others or take advantage of them pretend to be someone else in order to lure their victims in. As a general rule, it's a good idea to never meet anyone in person whom you only know online. You should also not share personal information over the internet with anyone that you don't know personally.

Phishing Attempts : Phishing happens when hackers try to pretend that they're sending a message from a friend or trusted company in an attempt to steal private information. For example, they might create a message that looks like it's from Amazon.com (possibly using logos) that says there's been a problem with an order and they need you to confirm your shipping information by clicking on a link. If you click on that link, you may compromise the security of your computer. As a rule, companies don't ask you click on links to verify your information. Always check the email address from which an email is sent and make sure that everything is spelled correctly. There may be slight variations in the email address, such as amazun.com instead of amazon.com. When in doubt, simply delete the email and call customer service to verify whether there is an actual problem.

5.5.5 Crowdsourcing

Crowdsourcing is reaching out to a group as a way to solve a problem. Sometimes, this means collecting ideas from users or professionals. Sometimes, it means pooling money or resources from a variety of people as a way to share the load. Because of advances in communication technology, crowdsourcing is easier than it's ever been.

Financial Hardship Crowdsourcing


Five individuals virutally contributing to a donation box. Illustration.

Crowdsourcing is a popular way to raise funds for important projects or expenses. When many people spread out a financial burden, no one individual has to pay too much. There are two major categories of financial crowdsourcing: unexpected expenses and startup projects.

Unexpected expenses or financial hardships can strike both individuals and businesses. A death in the family, a major accident or illness, or a natural disaster can cause sudden and potentially catastrophic financial needs. To help fill these needs, people use financial crowdsourcing platforms, such as GoFundMe, to ask people for donations of any size to help share the financial burden. A dollar amount is set as a goal and the donations continue until the goal is met. These kinds of fundraising campaigns are often shared on social media. The person who organizes the campaign can then use the platform to send periodic updates and thank you messages.

Startup Crowdsourcing

An aspiring entreprenuer pitching their business idea in a presention. Illustration.

Often an individual or business will have an idea they want to get off the ground, but they lack the funds they need to get started. Financial crowdsourcing is a great way both to raise funds and to gauge the level of public interest. Platforms such as Kickstarter and Indie GoGo allow users to set a funding goal and then give them a specific timeframe in which to reach it. Contributors pledge, or commit, to give a certain amount of money to the project. If the total pledges reach the goal, the project is funded. Otherwise, the donations return to those who pledged them.

As a way to encourage people to donate, the campaign can offer incentives at different donation levels. The more a person donates, the better the prize will be. Examples of incentives include free products, limited edition products, company swag, and just about anything else you can think of.

Idea Crowdsourcing


Group of individuals contributing ideas in the form of a larger lightbulb. Illustration.

Another way that crowdsourcing can be used is to gather ideas to tackle a problem or design a new product. This can take the form of digital surveys or focus groups that help companies understand what their customers want and what innovations they'd like to see. There are many programs that allow companies to create surveys and organize the responses they get. These include Google Forms, Survey Monkey, Qualtrics, and Zoho Survey. Companies use the data from their surveys to inform decision making.

Crowdsourcing and Social Media

Crowdsourcing is most effective when it reaches the greatest number of people. That means that using social media platforms, such as Twitter, Facebook, and Instagram, is an integral part of any modern crowdsourcing campaign.

The first step is to create social media pages for the campaign. People can then share these pages and follow them to get updates. Social media is also a great platform for targeted ads. These kinds of ads allow you to reach users that meet specific criteria, such as people living within a certain area, people who have a particular profession, or those who are within a certain age range. This helps you get the word out to the people who are most likely to respond. Many crowdsourcing campaigns also use multimedia, such as promotional videos, to foster participation.

5.5.6 Social Media Marketing

Today's businesses cannot avoid the presence of social media or the impact it can have. Potential customers prefer to see ratings on Amazon before buying a product or reviews on Yelp before booking a reservation. Because of this, businesses need to actively participate in social media communities in order to interact with and influence potential customers while expanding their business potential.

History of Social Media Social Media Logos


Twitter, Facebook, and Instagram logos.

For many, social media is a new concept. But in reality, this type of platform dates back to 1979 when Usenet was launched by the University of North Carolina. Usenet was a bulletin board system which allowed users to log in and interact by posting in online newsgroups. Dating sites peaked in the 1990s, which led to the development of social networks that were developed in the early 2000s. The first truly modern site of this kind was Friendster, which launched in 2002 and had millions of users until 2015 when it was sold. LinkedIn was launched in 2003 and is still a resource for professionals to reach out to one another, claiming over 660 million users in 2019. Myspace was also a social media platform that originated that same year and became well known by 2006. Similarly, Facebook was launched in 2004.

The 2000s and 2010s also conceived social media sites and mobile apps like Photobucket, Flicker, YouTube, Instagram, Snapchat, and Twitter. Since 2000, social media has only grown larger, mostly due to tablets and smartphones that allow for instant access to media in real time.

Importance of Social Media

Social media is a game changer for any business. Its powerful and instantaneous reach allows business owners flexible, inexpensive communication to customers. A well-executed social media optimization (SMO) strategy can give a business an overwhelming advantage. To ensure the maximum benefit from social media, however, a business needs to set well-defined goals and objectives. A good SMO strategy aims to build a reputation with customers by establishing trust through good public relations and a secure navigation experience as well as encouraging engagement and sharing by making the overall experience fun, original, and simple. Savvy teams study competitors' business ideas and improve on their strong points. This is what Myspace did with Friendster and what Facebook subsequently did with Myspace.

Social Engagement

Social media engagement is the process of reaching out to customers and interacting with them through social media

networks. This engagement creates a two-way street where a business can draw attention to a specific product or service. Every platform is different but most have some kind of feature that allows people to collectively organize themselves or their product (think YouTube channels or Facebook groups). Using these features, businesses can measure their engagement levels using cookies or whatever system the platform has built in to measure activity. In the era of viral videos, businesses are also using viral marketing to boost their business. Viral marketing is a message or post created with the intention of being shared over and over from one user to another. A popular example of viral marketing is the ALS ice bucket challenge that made its rounds on social media in 2014. In two months, the viral challenge made $115 million and gained increased media attention for millions.

ALS Ice Bucket Challenge


Young man participating in ALS ice bucket challenge. Facebook

Facebook was founded by Mark Zuckerberg on February 4, 2004, and is undeniably the most popular social media platform with over 2.45 billion accounts as of 2019. This social networking site can easily be turned into a far-reaching promotion tool if used successfully.

It's important to constantly stay updated with what the current market trends are as the nature of social media marketing is ever changing. Some of the latest Facebook trends are the use of cover photos for marketing as well as adverts for advertising. Adverts are shown to a specific audience of targeted Facebook users, and well-targeted adverts will get your business more likes, comments, and shares.

Facebook Ads


Laptop open to the Facebook Ads advertising tool. Twitter

Twitter is another social networking platform that allows users to read and write 280-character messages called tweets. A New York University undergraduate student named Jack Dorsey introduced the idea of using a message service to communicate with a small group. Initially called Twttr, it was first launched as an SMS-based communication platform. On March 21, 2006, Dorsey sent the first-ever tweet which read, "just setting up my twttr."

Twitter marketing is also a powerful tool for businesses to reach new customers and promote their brand. The rapid back-and-forth nature of the site can help businesses find out if customers are talking about them (negatively or positively) and respond accordingly.

Summary

The main purpose of social media marketing is to present a business and its message quickly and in the best light possible. While the main goal is promotion, businesses as well as individuals can find many other benefits from social media marketing. According to the latest figures, the number of mobile device users has easily surpassed the number of desktop users. Social media marketing in the mobile age is increasingly important, if not absolutely essential.

5.5.7 Activity: Set up a Social Media Profile

In this activity, you will either create or update a social media profile for yourself. Do the following:

1. Create a new social media account or open an existing account. Options include Facebook , Instagram , Twitter , LinkedIn , Snapchat , Pinterest , Reddit , and many more.


2. If you choose to include an email address as part of your social media profile, make sure it is set either to private or set so that it is only visible to your friends.


3. Manage other privacy settings for postings and other contact information. Limit the audience for any sensitive or personal information to friends only.


4. If you've previously shared any sensitive or personal information with the public, either remove that information or change the settings to limit who can view it.


5. Never share anything confidential about yourself, family members or friends, or upcoming vacation plans, anything regarding your bank account, inappropriate images, or anything else that could be potentially embarrassing or incriminating.

5.5.8 Section Quiz (Section Quiz) q_itf_socialMedia_facts_01

Web services that help people meet, interact, and share content with other people online are called         . Answers:

• *Social Media


• Internetworks


• Facebooks


• Web Servers


Explanation:

Social media are technologies that help people share their lives and connect with other people over the Internet.

The Internet is an internetwork, or a connection between networks. While an internetwork can facilitate web services, it would not itself be considered a web service.

Facebook is just one of dozens of social media applications.

A Web Server is a computer that stores web pages and transmits them to devices that request those pages. q_itf_socialMedia_facts_02

Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.)

Answers:

• Post the bully's physical address on social media.


• *Encourage friends and relatives to ignore the bullying.


• *Respond to the bully in a calm, clear, and constructive manner.


• Create a public group on social media (such a Facebook group) to confront the bully.


• Like, share, and comment on the bullying posts.


Explanation:

Encouraging your friends and relatives to ignore the bullying posts can help to diffuse the situation and may cause the bully to drop the effort to discredit you.

Sometimes responding to the bully in a calm, clear and constructive manner can help to diffuse the situation. Posting a person's personal information online, or doxxing, is inappropriate and dangerous, even when the target is a cyberbully.

Creating a public group to on social media (or any other social platform) to confront the bully is a negative approach that can result in escalating the situation, not diffusing it.

You should not participate in liking, sharing, commenting on, or forwarding the bullying posts. Ignoring the posts can limit the potential damage of the messages to victims and others.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf_socialMedia_facts_03

Which of the following are common risks of using social media? (Select two.) Answers:

• *Online information that you post is difficult to remove.


• Privacy settings are virtually non-existent.


• *Anonymity can lead some people to post harmful comments.

• You can be added to a group without your permission.


• Personal information can be used without your permission


Explanation:

It is extremely difficult to erase online information, so be careful of what you post. This is especially true of comments on social media and email messages you have sent.

The sense of anonymity provided by the internet can lead some people to post obnoxious or harmful comments that they would never consider making in person.

Many social media sites provide privacy settings to help protect your biographical and personal contact information from malicious users. As long as you take advantage of these settings, you can secure your personal information.

Being added to a group without your permission rarely happens. Trusted social media platforms normally provide a process that prevents you from unknowingly being added to a group.

While social platforms often track your viewing and response habits to provide marketing and other information suited to your personal preferences, trusted social media platforms allow you to protect your personal information through privacy settings and agreements between you and the social media company.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf2_facebook_01

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.)

Answers:

• *Targeted ads


• *Selling user-generated data to other companies


• Content


• Usage fees


• Membership fees


Explanation:

Like most social media platforms, Facebook, Twitter, and Instagram are free to use. They make money by showing targeted advertisements and selling user-generated data to other companies. Therefore, it's important that you never put anything on a social media platform that you don't want to be widely distributed.

q_itf2_facebook_02

Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all.

Answers:

• Facebook


• Instagram


• Twitter


Explanation:

Facebook is currently the largest social networking platform in the world, boasting 2.45 billion active monthly users. Facebook has added a variety of features over the years, including live video streaming.

Twitter is a microblogging platform. Users make public posts which can be viewed on their profile. The catch is that each post can only be up to 240 characters long.

Instagram is a social network that is focused on images. q_itf2_onlineProfiles_01

Which of the following should be done to protect your identity when creating a social media profile? Answers:

• *Always review and set privacy settings.


• Always use a fake name and fake personal information.


• Use the default privacy settings for the account.


• Always include your physical address and set privacy to Friends of Friends.


Explanation:

Most social media platforms that require you to create a profile have privacy settings. These settings allow you to decide which groups of people are allowed to see your profile. You should review and set privacy settings for all social media accounts to protect your identity.

Using false information can result in the removal of an account on many social media platforms. Providing minimal personal information and using privacy settings provides a better option than using a fictitious profile.

Using the default privacy settings for some social media platforms may expose your personal information to the public and should be avoided to protect your identity.

It is not advisable to provide information such as your physical address to those you do not know. This is especially true of a broad group of people.

q_itf2_onlineProfiles_02

When protecting your online identity, which of the following is an internet security threat you need to be aware of? Answers:

• *Phishing attempts


• Using personal information


• Using a different password for each social media platform


• USB keyloggers


Explanation:

Phishing is when hackers try to pretend they are sending a message from a friend or trusted company in an attempt to steal private information.

Using personal information is not an internet security threat if appropriate safeguards are put in place to prevent it from being hacked or stolen.

It is a best practice to use a different password for each social media platform. USB keyloggers are a local security threat.

q_itf2_crowdsourcing_01

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses?

Answers:

• *Crowdsourcing platform


• Crowdsourcing campaign


• Crowdsourcing website

• Crowdsourcing media


Explanation:

Crowdsourcing platforms provide a way to raise funds without web development expenses. The platform provides everything that is needed for a fee.

While a campaign, website, and media can all be part of raising funds, each requires web development or specific development efforts.

q_itf2_crowdsourcing_02

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? Answers:

• *Startup


• Financial hardship


• Idea


• Brainstorming


Explanation:

Often an individual or business has an idea they want to get off the ground, but they lack the funds they need to get started. Financial crowdsourcing is a great way both to raise funds to launch a project and also to gauge the level of public interest. Platforms such as Kickstarter and Indiegogo allow users to set a funding goal and then give them a specific timeframe in which to reach their goal.

GoFundMe is typically used for financial hardship.

Google Forms, Survey Monkey, Qualtrics, or Zoho Survey are typically used for idea or brainstorming crowdsourcing. q_itf2_smMarketing_01

Which of the following describes the strategy that defines a businesses social media goals and objectives? Answers:

• *Social Media Optimization (SMO)


• Search Engine Optimization (SEO)


• Social channels


• Social media marketing


Explanation:

A well-executed Social Media Optimization (SMO) strategy can give a business a great boost. To ensure the maximum benefit from social media, a business needs to set well-defined goals and objectives.

The other choices are not social media strategies that define goals and objectives.

5.6 Internet Communications Technologies Section Introduction

As you study this section, keep the following questions in mind:

• When is it best to answer an email with Reply All? When is it better to use Reply?


• How is VoIP similar to traditional telephone services? How is it different?


• What are the advantages of streaming vs downloading? What are the disadvantages?

After finishing this section, you should be able to:

• Describe the differences between downloading, live streaming, and on-demand streaming.


• Distinguish between synchronous and asynchronous communication.


• Describe safeguards to follow when using email.


• Display proper email etiquette by using Reply, Reply All, Cc, and Bcc appropriately.


• Explain the differences between texting, messaging, and online chat.


• Explain the communication technology that allows Voice over IP calls.


Key terms for this section include the following:

Term Definition


Voice over IP (VoIP)

A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.


Synchronous Technology

A technology that allows two or more groups to communicate in real time such as video conferencing, VoIP, or live streaming.


Asynchronous Technology

A technology that allows groups to communicate by taking turns, such as in emailing and text messaging.


Netiquette

Rules of etiquette that should be observed while using computer networks, such as the internet.


Texting

Phone communication in written form sent through SMS (Short Message Service) that can be sent over a cellular network or the internet. Multimedia Messaging Service (MMS) is an extension of SMS that supports picture, audio, and video messaging.


Messaging

A form of written communication similar to texting but is typically done with the use of an app like Facebook Messenger or WhatsApp, usually on a mobile device.


Online Chat

An online written form of communication that is typically web based and used by businesses as customer service tools to assist online users who visit their websites.


Streaming

A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.


Live Streaming

A streaming method that transmits data in real time as it is created.


On-Demand Streaming

A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a

scheduled broadcast time.


Buffering

The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.


Downloading

Creating a copy of a file from a web or network server and saving it to your local computer. This allows a user to open the file at any time even if they don't have a network connection.


5.6.1 Synchronous vs. Asynchronous Communication

The internet allows for all sorts of communication with varying levels of privacy. Some methods allow users to talk to each other in real time, while others allow people to communicate at different times at their leisure.

Synchronous vs Asynchronous Technologies

Online communication technologies are classified in a few different ways, including whether they're synchronous or asynchronous. Synchronous technologies are those which allow two or more groups to communicate in real time. This kind of messaging can be one to one, such as when two people are chatting back and forth, or one to many, such as when one person is live streaming a video and many other people are watching and interacting with it together.

Synchronous Communication


Examples of synchronous communication such as video conferencing and live streaming. Illustration. Examples of synchronous technologies include:

• Video conferencing (FaceTime, Google Hangouts)


• VoIP (Voice over Internet Protocol, an internet-based telephone technology)


• Live streaming (YouTube, Facebook Live)


On the other hand, asynchronous technologies are those that aren't done in real time. The prefix "a" simply means "not," so this word just means "not synchronous." The most common kinds of asynchronous communication are email and texting, where a person sends a message and the recipient can read it when they want to. Other kinds of asynchronous communication include blogs, message boards, and other social media sites. Once again, some methods are one to one, such as email and texting, and others are one to many, like blogs and social media.

Asynchronous Communication


Examples of asynchronous communication such as blogs and message boards. Illustration. Private vs. Public Technologies

The next distinction that can be made about online communication is whether they're public or private. Public means that anyone logged into the same website can see your message. Private means that only a single person or a limited group of people are able to see your message.

There are many kinds of private communication, and email and texting can fit this description. With these kinds of communication, you only send your message to specific people by using their email addresses or phone numbers. Other kinds of private communication are instant messaging, video conferencing, and VoIP. You can also adjust the privacy settings on social media posts so that only a specific group of people can see them.

Public communication includes blogs, forums, public social media posts, chat rooms, and live streaming. These kinds of communication are generally used for content that's meant to be freely shared and supposed to reach a wide audience.

Categories of Communication

When you take both these categories together, you create four distinct ones, as shown in the following chart. Choosing which technology you want to employ depends on your intended audience and whether or not you want your message to remain private or not.

5.6.2 Email Etiquette (Lesson Video)

Transcript:

Email is an essential part of the corporate world. Between coordinating assignments, communicating with customers, and keeping track of information, most office workers send and receive many emails every day. Because email is so vital, it's important to keep track of a few guidelines for professional email etiquette.

Here's an email we've received from a committee we're serving on. It's from one member, and it's addressed to us and the other members. One of the most useful things about email is that it can frequently be used to replace lengthy in-person meetings, as is the case here. We want to reply to this email, but we want all of the other committee members to see what we write. To reply to everyone at once, we'll use Reply All. To do this, click Reply All up here on the Ribbon. As you can see, Outlook automatically added all of the recipients of the previous email to the To field. We may also want to send a carbon copy of this email to someone else, such as a supervisor. The carbon copy field is generally used when you want to keep someone in the loop, even if they're not expected to respond to the email. Now we can type our message above this line and click Send.

This email was sent by the HR director to everyone at the company and is about the company's health insurance plan. Suppose we have a question about the plan that we want the HR director to clarify for us. In this case, it probably wouldn't be appropriate to use Reply All because then every single person at the company would receive the email. At best, this would be a distraction for everyone because they'd have to read the email, realize that it doesn't apply to them, and delete it. At worst, you could accidentally share private information with the whole company that was only meant for the HR director. This time, we'll click Reply on the Ribbon. Notice how the only person in the To field is the HR director. Now we can compose our email and click send.

Finally, we have a marketing email that we want to send to several different customers. However, if we put all of the customers in the To field, they'll be able to see each other's email addresses. Since they probably don't want their email address published to everyone else on the list, we'll use the Blind Carbon Copy feature. Here in the message window, we'll click the Cc button to open a dialog box. Then, down here on the Bcc line, we can add the email addresses of our customers, separated by semicolons. For this demonstration, we'll also add our own email address. Now we can click OK. If we open the received message, we can see that there are no email addresses on the To line. This way, even though several people are included on the same email, they can't see each other's addresses.

In this video, we discussed a few basic points of email etiquette. We learned the difference between reply and reply all, and when to use To, Carbon Copy, and Blind Carbon Copy. Following these guidelines will save you use email effectively and avoid potential embarrassment.

5.6.3 Email Etiquette Facts

Netiquette refers to rules of etiquette that should be observed while using computer networks, such as the Internet. Using a computer to interact with other users tends to impart a sense of anonymity, which can cause you to behave in ways that are impolite or even offensive.

To keep this from happening, Netiquette proposes a general set of guidelines that all network users should adhere to. The overarching rule of netiquette is this: Don't do or say anything to another person online that you would not do or say if you were looking at them face to face.

There are also several more specific guidelines that will help you achieve this goal. Table 1: General Netiquette Guidelines

GUIDELINE DESCRIPTION


Show Consideration for Other Users' Time

Before making an online post or sending an email, make sure it is worth the time of those who will read it. A common violation of this rule occurs when someone forwards a mass email message of questionable origin to everyone in their address book. Before doing this, consider the following:

• Verify the authenticity of the information you are sending.


• Ask yourself whether the recipients actually need (or even want) to read it.


Use Appropriate Spelling and Grammar

The anonymity of the Internet frequently makes users careless about following spelling and grammar rules. This can

make a message difficult to read and can even make it impossible to decipher. Also, avoid using all capital letters. On the Internet, this is considered "shouting."


Write Clearly and Concisely

A lot of Internet users are careless about how they communicate ideas in messages and posts. To respect other users' time and to make sure your ideas are communicated correctly, be sure your posts and email messages are:

• Clear . Read through your message and make sure your point is clearly stated. Remember, the reader may not have the same background that you have. Will they understand what you are trying to say?


• Concise . Be brief and to the point. Nobody likes to wade through a ten-page email or post trying to find important information.


• Readable . Use understandable terms when you write. Many Internet users prefer to use shorthand terms in their posts and messages, such as u r ("you are") and idk ("I don't know"). While using shorthand can reduce the amount of time needed to compose a message, it makes it much more difficult to read. It can also obscure the meaning and intent of your message, resulting in misunderstandings.


Avoid Being a Troll

A troll is someone who deliberately tries to create conflict among users. Expressing your opinion is encouraged on the Internet; however, trolls are not usually interested in engaging in a healthy dialog. Instead, they seek to cause contention and disrupt the conversation. Trolling tactics include the following:

• Posting provocative, offensive, and even hateful messages to incite a response from other users.


• Posting off-topic messages in an attempt to start an argument.


• Posting obscene or menacing messages to harass another user.


If you encounter a troll, the best response is to just ignore them. Obey the Law

Be familiar with the laws in your jurisdiction surrounding computer use and cyber security, and abide by them. For example, in the United Kingdom, the Communications Act of 2003 criminalizes the act of being an overly aggressive Internet troll that targets a specific individual.


Table 2: Email Etiquette FEATURES/TERMS DESCRIPTION


Reply

You'll often want to respond directly to the sender of an email without replying to the other recipients. To do this, use the Reply option rather than Reply All . If needed, you can then add other recipients to your reply manually. By default, a message reply will not include email attachments that were included in the original message.


Reply All

Use this option to send a message to everyone included in an email: the sender, recipients listed in the To: field, and recipients in the Cc: field. Use the Reply All option only when your reply contains information that is critical for all

recipients. Otherwise, use Reply and then add other recipients manually.


Forward

Use this option to send an email from your Inbox to another person. By default, a forwarded message will include all email attachments that were included with the original message. After selecting the Forward option, you can add a brief note at the top of the original message as needed.


File Attachment

An attachment is a separate file, such as a Microsoft Word document or a photo, that is sent through email. When you send an attachment, the recipient of your message will be able to download their own copy of the file to their computer. Be careful when opening email attachments. Sometimes malicious users will attach viruses or other malware to an email, so you should only open an attachment when it's from a source you recognize and trust.


Cc

Cc stands for carbon copy or courtesy copy. In your email program, add people to this field who should be kept in the loop, but aren't necessarily expected to respond.


Bcc

Bcc stands for blind carbon copy. People added to this field will receive the email, but their addresses will be hidden from other recipients.


Junkmail

Junkmail refers to unwanted, unsolicited email, including product advertisements, hoaxes, dubious opinions, and scams. Most email clients include a feature that automatically filters out junkmail. Domains or email addresses that are not caught with standard email filters can be blocked manually and then sent to a junk folder. If a legitimate email is mistakenly flagged as junkmail, the address can be added to a "safe senders" list.


5.6.4 Email Etiquette in Microsoft Outlook (Demo Video) Transcript:

In this lab, you'll respond to two email messages. First, we have a message from Gladys Grant. Since this email is a discussion with a small group and everyone needs to see our response, we'll use Reply All. This will send our reply to everyone included in the email. Click Reply All, then type the message. If you prefer, you can select the message text from the instructions, which will automatically copy it to your clipboard. Once the message is written, we'll add a signature. In the include group, click Signature, then select My Name. Click Send.

Next, we'll look at this Important HR Info email. First, we'll save the attachment. Click this arrow, then click Save As. Make sure you're in the Documents folder, then click Save.

This email was sent to everyone at the entire company. We want to ask a specific question that doesn't concern everyone, so we will not use Reply All. Instead, we'll use Reply, which will send our message to the original sender and nobody else. Since we know that James Jordan has the same question we do, we'll add him on the CC line. Start typing his name, then click his email address when it appears.

Once again, we'll write our reply here at the top. When we're finished, click Send.

5.6.5 Email Etiquette in Microsoft Outlook (Simulation) Scenario

As a sales associate at RMK Supplies, you have several new messages in your Outlook Inbox. Use the following instructions to respond to two messages with proper email etiquette:

1. Respond to Gladys Grant's Project Proposal email: o Reply to the sender and all other users who received the message.


o Enter the following text in the body of your reply:

Explanation

To complete this lab, do the following:

• Respond to Gladys Grant's Project Proposal email a. In the Inbox message list, right-click the Project Proposal message and select Reply All .


b. In the message body, on the top line, type:


5.6.6 Texting, Messaging, and Online Chat


A pair of hands using a smartphone to send a text message. Photo by Priscilla Du Preez on Unsplash

Communication technology has made tremendous progress in recent years. Smartphones, tablets, and laptops allow for easy communication though texting, instant messaging, and chat. In this lesson, we'll compare and contrast these different technologies. Though these terms are sometimes used synonymously, there are important distinctions between them. But in the end, what's important is that all these technologies allow people from every part of the world to connect in seconds.

Texting

"Merry Christmas" was the first text message ever sent. It was sent on December 3, 1992, by Neil Papworth, a former developer at Sema Group Telecoms. Since then, text messaging through means of Short Message Service (SMS), has outranked the typical phone call as a way to communicate and is used by 81% of all cellular phone users. SMS supports 160 characters per message, but most cell providers can divide long messages into smaller pieces for transmission and reassemble them on the other side. Multimedia Messaging Service (MMS) is an extension of SMS that supports picture, audio, and video messaging. SMS and MMS messages are typically sent though a messaging app on a smartphone and are saved as they're sent and received. These messages can be sent over a cellular network or the internet.

Messaging

Messaging is similar to texting but is typically done with the use of an app (like Facebook Messenger or WhatsApp), usually on a mobile device. With text messaging, you have to know the phone number or email address of the person you're texting.

But with messaging, you can talk to anyone who is also using the app, giving you a greater reach. Messaging also allows you to see and share more content with others. For example, Facebook allows you to post items for sale so potential buyers can message you to arrange a deal. Businesses can create pages that allow consumers to message them about products or services.

Online Chat

Before the smartphone era, online chats were very popular. The CompuServe CB Simulator came out in 1980 and was the first online chat service that was available to the public. Nowadays, online web chats are primarily used by businesses as customer service tools to assist online users who visit their website. Online chats have also started to utilize AI technology to automate common responses to customers, allowing them the ability to quickly ask questions. Also, in many cases, it's easier for a customer to chat with a business then to call their customer service by phone. Since online chatting is typically web based and not mobile friendly, companies have been working to integrate SMS, Facebook Messenger, and voice messaging into online chats to allow for a better customer experience.

A typical online chat isn't saved unless a copy of the chat is downloaded at the conclusion of the conversation. For this reason, you cannot go back to the chat after it's been closed and continue where you left off.

5.6.7 Voice over IP How VoIP Works

VoIP, or voice over Internet Protocol, is a process that takes analog audio signals and turns them into digital data that's transmitted over the internet or a local area network (LAN). Instead of a traditional circuit-switched transmission over the public switched telephone network (PSTN), VoIP technology uses packet-switched protocols that transfer sound by

emulating the movement of speech waves. Each block of data is labeled with the destination's address so the data can find its way to the correct destination. Using VoIP allows for free phone calls using a standard internet connection, bypassing a phone carrier and their charges.

How VoIP Works


A VoIP process diagram. Illustration. History of VoIP

VoIP transmissions first began in 1973 as a result of the experimental Network Voice Protocol (NVP) invented for the ARPANET. It wasn't until 1995, however, that an Israeli telecom equipment provider named VocalTec created the first for-profit internet phone. Their phone allowed users to call each other through connected speakers and microphones that used the same software. VocalTec also came out with computer-to-telephone and phone-to-phone calling features, though the adoption of VoIP was meager at only around 1% due to a surplus of ads.

By 1999, VocalTec encountered some competition when Teledvance entered the market with advanced VoIP capabilities. Teledvance didn't have to rely on disruptive advertising for revenue since by then the corporate market was desperately

seeking for cost-effective alternatives to making calls over the internet. By 2003, 25% of all calls were VoIP calls due to the expansion of broadband connectivity.

In the early 2000s, Session Initiation Protocol (SIP) evolved as a protocol that allowed developers to avoid the limitations of expensive hardware and create applications that could integrate with almost any smartphone platform. In 2003, Skype launched its beta software and emerged as one of the first applications to allow calls to landlines and cells phones using VoIP. Skype continued adding new features and by 2005 had integrated video chat into its software.

Nowadays, Microsoft Skype for Business is available in 108 languages and offers many more features like instant messaging, video calls, online meeting capabilities, cloud productivity apps, and more. This made them hands down the leading contender in the VoIP market. In 2005, the number of registered Skype users was 50 million which later increased to 660 million by 2010, 300 million of them being active monthly users. Today, there are dozens of other programs and smartphone apps that allow you to make VoIP calls, including Google Talk, WhatsApp, and Apple FaceTime.

5.6.8 Online Streaming (Lesson Video) Transcript:

Whether you know it or not, you already have some experience with online streaming. I know because you're streaming this video right now. Streaming is a way to transmit data, such as audio or video, as a continuous flow. This means that, instead of having to download an entire file before you can view it, you can play the file as it downloads. In this video, we'll look at the differences between downloading and streaming files.

When you download a file, you create a copy of a file from a web or network server and save it to your local computer. After the file has been downloaded, you can open it at any time, even if you don't have a network connection. You can also make changes to the file and create additional copies. When you download a file, your computer and the server communicate back and forth to make sure the download is an exact copy of the original. While this ensures the quality of the downloaded file, it makes the process much slower.

When you stream video, the server doesn't verify that your computer received the files correctly – it just sends a continuous stream of data. This makes streaming video much faster than downloading, but it also means that the stream may have some errors in the data. If you've ever watched a video stream and it looked a little glitchy, that's why.

There are two main types of streams: Live streams and on-demand streams. Live streams transmit data in real time as it is created. Some examples are online video calls, traffic cams, and gamer streams. Live streams are kind of like listening to the radio. They send data directly to your device where it is played, then immediately discarded. Live streams can't be paused or stored, and you can't go back to a previous part of the stream.

This video is an example of an on-demand stream. With on-demand streaming, you can watch a video or listen to an audio file at any time if you have an Internet connection. Data is sent from a server to your device, which starts temporarily storing the data. This is called buffering. When there's enough data in the buffer, playback begins. With on- demand streaming, you can pause and skip to different parts of the file. However, the files are temporary and don't remain on your computer, so you can't modify them or make copies.

We just learned some differences between downloading and streaming. Downloading creates a permanent copy of a file on your computer. Streaming is much faster than downloading but only stores files temporarily. We also learned the difference between live streaming and on-demand streaming.

5.6.9 Online Streaming Facts

There are two main ways to watch videos from the Internet: downloading, which creates a copy of the complete video file on your local computer, and streaming, which transmits the data to your computer in a continuous flow, allowing you to watch the video as it downloads. The table below describes the most common options for viewing online videos. Table 1: Ways to Watch Online Videos

METHOD DESCRIPTION


Downloading

When you download a file, you create a copy of a file from a web or network server and save it to your local computer. After the file has been downloaded, you can open it at any time, even if you don't have a network connection. You can also make changes to the file and create additional copies. Downloading uses the TCP protocol, meaning your computer and the server communicate back and forth to make sure the download is an exact copy of the original. While this ensures the quality of the downloaded file, it makes the process much slower.


Live Stream

Live streams transmit data in real time as it is created. Some examples are online video calls, traffic cams, and gamer streams. Live streams are kind of like listening to the radio. They send data directly to your device where it is played, then immediately discard it. Live streams can't be paused or stored, and you can't go back to a previous part of the stream.


On-demand Stream

The videos in this course are an example of on-demand streaming. With on-demand streaming, you can watch a video or listen to an audio file at any time if you have an Internet connection. Data is sent from a server to your device, which starts temporarily storing the data. This is called buffering. When there's enough data in the buffer, playback begins.

With on-demand streaming, you can pause and skip to different parts of the file. However, the files are temporary and don't remain on your computer, so you can't modify them or make copies.


5.6.10 Section Quiz (Section Quiz) q_itf2_synchasynch_01

Which of the following are considered asynchronous technologies? (Select two.) Answers:

• Video conferencing


• *Email


• Voice over Internet Protocol (VoIP)


• *Message boards


• Live streaming


Explanation:

The most common kinds of asynchronous communication are email and texting, in which a person sends a message and the recipient can read it at their convenience. Other kinds of asynchronous communication include blogs, message boards, and social media sites like Facebook, Twitter, Instagram, and others.

Examples of synchronous communication include:

• Instant messengers (Skype, Facebook Messenger)


• Video conferencing (FaceTime, Google Hangouts)

• VoIP (voice over Internet Protocol, Internet-based telephone technology)


• Chat rooms and apps (Discord, Slack)


• Live streaming (YouTube, Facebook Live)


q_itf2_synchasynch_02

Which of the following are considered private technologies? (Select two.) Answers:

• Live streaming


• *Video conferencing


• Chat rooms


• Social media posts


• *Instant messaging


Explanation:

There are many kinds of private communication, including email and texting. With these kinds of communication, you only send your message to specific people with their email address or phone number. Other kinds of private communication include instant messaging, video conferencing, and VoIP.

Public communication includes blogs, forums, public social media posts, chat rooms, and live streaming. These kinds of communication are generally used for content that is meant to be freely shared and that is supposed to reach a wide audience.

q_itf_etiquette_email_facts_01

Which option should you use to respond to the sender of an email but not all the recipients? Answers:

• *Reply


• Reply All


• Forward


• CC


Explanation:

Using the Reply option sends an email to the author of an email but excludes other people included on the original message.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_etiquette_email_facts_02

Which option should you use to respond to every single person included on an email? Answers:

• *Reply All


• Reply


• Forward

• CC


Explanation:

Reply All sends a message to the original author of an email, as well as all other recipients. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_etiquette_email_facts_03

Which option should you choose to send an email you've received to a new person? Answers:

• *Forward


• Reply


• Reply All


• CC


Explanation:

Forward is used to redirect an email to someone other than the original author. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_etiquette_email_facts_04

Which of the following is a valid email address? Answers:

*support@testout.com


• support#testout.com


• support@testout


• support#testout


Explanation:

Valid email addresses must have two parts: a unique address, and a domain (such as gmail.com). These must be separated by a @.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf_etiquette_email_facts_05

Files that you send along with an email message are called       . Answers:

• *Attachments


• Extras


• E-files


• MMS


Explanation:

Attachments are files sent along with an email message. Since attachments can contain malware, only open attachments

from sources you trust.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.3. q_itf2_texting_01

Which of the following typically does NOT save a conversation after it has taken place? Answers:

• *Online chat


• Email


• Message board


• SMS/MMS


Explanation:

A typical online chat is not saved unless a copy of the chat is downloaded at its conclusion.

The other options are not viable answers as they typically do save conversations after they take place. q_itf2_voip_01

Which of the following is a disadvantage of a VoIP system? Answers:

• *Relies fully on a stable internet connection


• The costs associated with the initial setup


• One account for internet and phone


• Users communicate using VoIP from PC to PC


Explanation:

VoIP systems do unfortunately come with a few disadvantages. For example, VoIP systems fully rely on a stable internet connection with adequate bandwidth.

One major reason for the adoption of VoIP were the cost savings associated with the initial setup and lack of long- distance charges. As VoIP works off your current internet connection, companies can do away with traditional phone lines and have one account for the internet and phone. Users can then communicate using VoIP from PC to PC with no additional charge.

q_itf2_streaming_01

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause?

Answers:

• *The video may become glitchy.


• The video must be constantly restarted.


• A copy of the video file must first be saved to your computer.


• The video may cause your system to crash.


Explanation:

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This makes streaming video much faster than downloading, but it also means that the stream

may have some errors in the data. Glitchy video quality and behavior is a common occurrence with video streaming. It is also important to remember that streaming sends data directly to your device where it is played and then immediately discarded. Live streams can't be paused or stored, and you can't go back to a previous part of the stream.

5.7 The Internet of Things Section Introduction

As you study this section, keep the following questions in mind:

• If digital assistants are free to use, why do companies spend millions of dollars to develop and support them?


• Are there any IoT devices that I might find helpful?


After finishing this section, you should be able to:

• Define the Internet of Things.


• Identify some of the most common devices that make up the Internet of Things.


• Use a home security app to install and configure smart devices such as cameras, light switches, locks, thermostats, and outlets.


• Describe the features of digital assistants such as Siri, Cortana, and Google Assistant.


Key terms for this section include the following:

Term Definition


Internet of Things (IoT)

A computing concept that describes the network of everyday physical devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.


Digital Assistant

Software found on almost every computer or smart device that makes a variety of tasks easier, especially by allowing you to control your device with just your voice. Examples of digital assistants are Apple's Siri, Microsoft's Cortana, Amazon's Alexa, and Google's Google Assistant.


5.7.1 The Internet of Things (Lesson Video) Transcript:

When we think about the Internet, we usually think about using a computer or phone to browse the web, shop online, or send email. However, an increasing number of everyday objects are being built with Internet connectivity. This concept of connecting many kinds of devices to the Internet is called the Internet of Things, or IoT. In this video, we'll look at several areas where IoT technologies are emerging.

You may have heard the term "Smart Home," which refers to a home with devices that can be controlled remotely over the Internet with a phone or computer. Many smart homes have Internet-enabled security systems. Indoor and outdoor security cameras record live video footage that the resident can view from their phone or tablet, and alarms inform the police in the event of a break-in. Thermostats can learn the residents' daily routines and adjust the temperature of the home accordingly. Even home appliances, like refrigerators and coffee makers, can be controlled over the Internet by phone.

Another area that is seeing an increase in "Smart" technology is the automotive industry. Owners of Internet-enabled cars can use their phones to lock and unlock their doors, monitor their gas usage, and check their engine status. Online navigation software can be used instead of GPS, and music apps can replace the need for a traditional radio.

In coming years, cars and trucks will use the Internet to drive themselves, without needing a person behind the wheel.

Driverless cars will create a massive impact on the transportation industry and change the way we think about getting around.

IoT technology is widely used in emergency and medical scenarios. Smart ambulances can communicate with traffic lights, changing them to green as they approach. This "green corridor" lets emergency vehicles arrive at their destination faster and more safely. Patients with heart or breathing problems can wear Internet-enabled sensors that automatically contact emergency services if they sense a problem.

In this video, we talked about the Internet of Things. We discussed IoT applications for homes, cars, and emergency services. As technology improves, we can expect to see more IoT devices in our daily lives.

5.7.2 Internet of Things Facts

An increasing number of everyday objects are being built with internet connectivity. This concept of connecting many kinds of devices to the internet is called the Internet of Things (IoT). This lesson describes IoT applications for homes, cars, and emergency services. As technology improves, there will be more IoT devices.

Table 1: Internet of Things IOT TECHNOLOGY DESCRIPTION


Smart homes

The term smart home refers to a home with devices that can be controlled remotely over the internet with a smartphone or computer. Many smart homes have internet-enabled security systems. Indoor and outdoor security cameras record live video footage that the resident can view from a phone or tablet. The security systems have alarms that inform the police in the event of a break-in. Thermostats can learn the residents' daily routines and adjust the temperature of the home accordingly. Even home appliances, like refrigerators and coffee makers, can be controlled over the internet by phone.


IoT cars

Owners of internet-enabled cars can use phones to monitor gas usage and engine status. Online navigation software can be used instead of a separate Global Positioning System (GPS), and music apps can replace the need for a traditional radio. Some cars and trucks can now use the internet to drive themselves. In the future, you may not even need a person behind the wheel. Other IoT innovations include the capability to automatically accelerate or brake a vehicle as needed.


Emergency and medical applications

To save human lives, emergency vehicles can use IoT systems for better response times. A smart ambulance system (SAS) can be integrated with an intelligent traffic control system (ITCS) that controls the timing of traffic lights in the path of the emergency vehicle.


In other words, smart ambulances can communicate with traffic lights, changing them to green as they approach. This green corridor lets emergency vehicles arrive at the destination faster and more safely. Patients with heart or breathing problems can wear internet-enabled sensors that automatically contact emergency services when a problem is sensed.


Aerial Vehicles

One of the fastest growing markets in IoT is unmanned aircraft systems (UAS) because they provide large commercial and strategic opportunities. For example, these UAS systems (sometimes called drones) can help in industries, such as agriculture, filming, and the military.


5.7.3 Digital Assistants Apple's Apple watch.

Photo by Gian Prosdocimo on Unsplash

Almost every computer or smart device on the market today comes equipped with a digital assistant. Not only are these assistants part of smartphones and computers, but they are now common in smart home devices such as Amazon Dot and

Google Home.

Understanding the features of each will help you become a better user of various kinds of technology. These digital assistants can make a variety of tasks easier, especially by allowing you to control your device with just your voice. Digital assistants are based on artificial intelligence (AI) and a field of computing known as natural language processing (NLP), where a computer interprets natural human speech into commands that it can execute. Many of these assistants can learn and adapt over time to your speech patterns to become more accurate and helpful.

Apple's Digital Assistant Siri


Apple's digital assistant, Siri logo.

One of the earliest digital assistants was Siri, which debuted on the Apple iPhone 4S in 2011. It's now available on a wide variety of Apple devices, including the iPad, iPod Touch, Apple Watch, AirPods, HomePods, and on Mac computers that run macOS Sierra or later.

The idea behind Siri was a virtual assistant that would respond to voice commands given in a natural way. Siri's capabilities have grown over the years and it currently can do things such as open programs, set reminders, play music, set alarms, send text messages, navigate to a destination, and run internet searches.

One of the fun things that has set Siri apart are the variety of Easter eggs the developers have worked into the program. There a variety of humorous things you can ask Siri, which results in a tongue-in-cheek response, such as Beam me up, Scotty. You can also ask Siri to tell you a joke or beatbox (a form of vocal percussion) for you. Siri can also be used in a variety of languages in addition to English. These include German, French, Spanish, Mandarin Chinese, Russian, and many others.

Microsoft's Digital Assistant Cortana


Microsoft's digital assistant, Cortana, logo.

With the release of Windows 10, Microsoft unveiled its own digital assistant named Cortana. It was incorporated into Windows Phone (WP), Invoke smart speakers, Microsoft Band, and Surface Headphones, Xbox consoles, and Android phones. It was named after a fictional AU character in the Halo video game (a video game franchise on the Xbox). The voice actress for the character in the game reprised her role.

Cortana functions similar to Siri and can recognize natural speech patterns to set reminders and answer questions. It uses the Microsoft search engine, Bing, which is incorporated into Microsoft products and the Microsoft Edge web browser. It's also available in other languages besides English.

Amazon's Digital Assistant Amazon Echo Dot


Amazon's Echo Dot.

In 2014, Amazon released its digital assistant named Amazon Alexa (usually referred to as Alexa). It can interact with your voice, play music, set alarms, stream podcasts, play audio books, provide weather reports, traffic reports, and fetch information such as the news. The sound of Alexa's voice was inspired by the voice of the computer on USS Enterprise (from the tv series Star Trek).

One of Alexa's major capabilities is its ability to control smart devices throughout a home, such as lighting, security systems, and even appliances like microwaves.

Alexa's capabilities can be expanded by installing third-party skills (similar to apps) that give Alexa new abilities. Some Alexa-enabled devices wake up and start listening to you if you say Alexa. This is a privacy concern for some. Models are available that require you to push a button on the device to allow it to start listening.

Google's Digital Assistant Google Assistant


Google's digital assistant, Google Assistant, logo.

Google's first attempt at a virtual assistant was called Google Now. It was launched in 2012. It proactively gave users what it predicted they would need based on their search habits. By 2016, the company had transitioned into the new Google Assistant that allows two-way voice conversations with users.

Google's AI assistant is available on a variety of mobile and smart home devices, such as speakers and appliances. It was originally available only on Google Pixel and Google Home but is now available on a variety of other Android devices.

It's even available in limited form on Apple products.

Google Assistant can be used hands-free by simply saying, "OK, Google" and then giving it a command. It has a feature called continued conversation, which means you don't have to repeat the wake up phrase once you've started talking to it. Google Assistant continues listening for a while after you've activated it as well. It can recognize different voices that it's become used to and tailor its responses accordingly.

Google Assistant can take voice commands, run Google searches, control connected devices, play music, make appointments, send messages, read aloud notifications, translate in real time, play content through Chromecast (and other streaming devices), access information from your calendars, etc. It integrates with other Google services like Google Maps to provide directions and Google Play to provide entertainment.

5.7.4 Configure Smart Devices (Demo Video) Transcript:

In this lab, you've installed several Internet of Things, or IoT, devices. Now that they're physically installed, you want to pair them with your iPad so you can control them over the Internet.

To start, click the TestOut Home app. This isn't a real application, but it's very similar to IoT applications you'll see in real life. The first thing we'll do is create three digital rooms in the app to correspond to the physical rooms in our office. Click the hamburger menu, then click New Room. Type the name of the room, then click Save. Do the same for the remaining two rooms.

Now that we've created rooms, we can configure the devices in each room. We'll start with the lobby. Click this arrow to enter the digital Lobby. In the top right corner, click the + to add a device. To pair a device to our app, we need to enter its unique pairing code. In real life, this can be found in the package the product came in. In this lab, the pairing codes are in a table under the task instructions. Enter the pairing code for the lobby camera. If you don't want to type, you can copy and paste the number directly from the instructions. Double-click the number to select it, click into the text entry box, and press Control V to paste. Click Lobby Camera, then Add Device. If we click this icon, we can see that the camera is working. We'll follow the same steps for the rest of the lobby. Before we move on, make sure to turn the light on and lock the door.

Once we're done with the lobby, we'll click this arrow to move on to the Main Hall. We'll add a thermostat following the same steps as before. Once it's installed, we can use our iPad to change the temperature of the room.

Finally, we'll click the arrow to move to Office 1. Just like before, we'll add and pair our devices. If we click the camera, we can see the video feed from the office. We can also turn on the smart outlet by clicking here.

5.7.5 Configure Smart Devices (Simulation) Scenario

You are the IT administrator for a small corporate network. In your office building, you've installed a smart thermostat, smart light switches, smart cameras, and smart door locks. Using the TestOut Home app, you need to create rooms for where you've installed the smart devices and configure the device settings.

In this lab, your task is to complete the following:

• Create the following rooms for the smart devices in the TestOut Home app: o Lobby


o Main Hall


o Office 1


• Configure the devices in the Lobby as follows: o Install the Lobby Camera.


o Install and configure a smart light switch so you can turn the lights on and off from your iPad. Turn the light on.


o Install and configure a smart lock so you can lock the front door without leaving your office. Lock the door.


o Install a smart assistant.

• Configure the device in the Main Hall as follows: o Install and configure the thermostat. o Set the temperature to 72 degrees.


• Configure the devices in Office 1 as follows: o Install the Office Camera. o Install and configure a smart outlet. Turn the outlet on.


The following table identifies the pairing codes for the smart devices: Smart Device

Pairing Code


Assistant 4377043770


Light Switch 6718471173


Lobby Camera 1533705506


Locks 6339057209


Office Camera 1533705434


Outlet 1234567890


Thermostat 1753016434


Explanation

In this lab, your task is to complete the following:

• Create the following rooms for the smart devices in the TestOut Home app: o Lobby


o Main Hall


o Office 1


o Install the Lobby Camera.


o Install and configure a smart light switch so you can turn the lights on and off from your iPad.

o Install and configure smart locks so you can lock the front door without leaving your office.


o Install a smart assistant.


o Install and configure the thermostat.


o Set the temperature to 72 degrees.


o Install the Office Camera.


o Install and configure a smart outlet.


• Configure the devices in the Lobby as follows:


• Configure the device in the Main Hall as follows:


• Configure the devices in Office 1 as follows:


Complete this lab as follows:

1. In the TestOut Home app, create rooms for the devices as follows: a. On the iPad, select TestOut Home .


b. In the left corner, select the 3-line icon to create a room.


c. Select New Room .


d. In the Room Name field, enter the name of the room.


e. Select Save .


f. Repeat steps 1b–1e to create additional rooms.


2. Configure the Lobby smart devices as follows: a. Select the arrow on the right side of the screen to move to the Lobby room you created.


b. On the Lobby page in the right corner, select + to add a smart device to the room.


c. In the Pairing Code field, enter the pairing code for the device you wish to add.


d. Select the smart device .


e. Select Add Device .


f. Repeat steps 2b–2e until you've added all the devices for that room.


g. Select Smart Camera to verify that the camera is working.

h. Select Done .


i. Select Smart Light Switch to turn the light on.


j. Select Smart Lock Switch to lock the doors.


3. Configure the Main Hall smart devices as follows: a. Select the arrow on the right side of the screen to move to the Main Hall room you created.


b. On the Main Hall page in the right corner, select + to add a smart device to the room.


c. In the Pairing Code field, enter the pairing code for the device you wish to add.


d. Select the smart device .


e. Select Add Device .


f. Repeat steps 3b–3e until you've added all the devices for that room.


g. Select Smart Thermostat Temperature to modify the temperature.


h. Under Cooling, select Down until the temperature reaches 72 degrees.


i. Select Done .


4. Configure the Office 1 smart devices as follows: a. Select the arrow on the right side of the screen to move to the Office 1 room you created.


b. On the Office 1 page in the right corner, select + to add a smart device to the room.


c. In the Pairing Code field, enter the pairing code for the device you wish to add.


d. Select the smart device .


e. Select Add Device .


f. Repeat steps 4b–4e until you've added all the devices for that room.


g. Select Smart Camera to verify that the camera is working.


h. Select Done .


i. Select the Smart Outlet Switch to set it to on.

5.7.6 Section Quiz (Section Quiz) q_itf_internetofthings_01

Which of the following is considered part of a smart home? Answers:

• TV


• *Thermostat


• Laptop


• Telephone


Explanation:

The term smart home refers to a home with devices that can be controlled remotely over the internet with a smartphone or computer. Thermostats can learn the residents daily routines and adjust the temperature of the home accordingly.

Items that typically connect to a video, audio, or data network as a core part of their functionality are not considered part of a smart home.

q_itf_internetofthings_02

Owners of internet-enabled cars can use their phones to do which of the following? Answers:

• Change traffic lights


• *Monitor fuel usage


• Control their speed


• Adjust tire pressure


Explanation:

Owners of internet-enabled cars can use their phones to lock and unlock their doors, monitor their gas usage and tire pressure, and check their engine status.

Smart ambulances can communicate with traffic lights, changing them to green as they approach. q_itf_internetofthings_03

Which of the following is used to change traffic lights for emergency vehicles? Answers:

• *ITCS


• IoT car


• Smart car


• IoT sensor


Explanation:

The Smart Ambulance Service system (SAS system) uses the Intelligent Traffic Control System (ITCS) to automatically control the timing of traffic lights that are in the path of emergency vehicles.

q_itf_internetofthings_04

Linda has just purchased a Tesla electric car with online navigation software and the ability to automatically drive itself. Which of the following BEST describes this type of technology?

Answers:

• Digital assistant

• Hyper-automation


• *IoT (Internet of Things)


• Edge computing


Explanation:

IoT (Internet of Things) describes objects that are built with internet connectivity. This includes cars that have their own online navigation system and the ability to use the internet to drive themselves.

Digital assistants are based on Artificial Intelligence and Natural Language Processing (NLP) and can make a variety of tasks easier, especially by allowing you to control your device with your voice. While a digital assistant is often included with newer vehicles for hands-free operation, IoT is the best overall description of the technology for connecting Linda's car to the internet.

Hyper-automation is a business approach in which an organization identifies and automates as many of its tasks as possible. It does not involve a device (such as a vehicle) connecting to the internet.

Edge computing moves processes closer to the computers or devices themselves and away from the centralized cloud. For example, Linda's self-driving car contains many automated systems that have to make split-second decisions locally (based on sensor data) that do not require internet access. But it needs IoT connectivity for other self-driving data and navigation.

q_itf_internetofthings_05

Which of the following are examples of newer devices that are often automated using (Internet of Things) IoT technology? (Select three.)

Answers:

• *Streaming media devices


• Computer monitors


• Headsets


• *Home appliances


• Tablets


• *Security systems


• Printers


Explanation:

Streaming media devices with IoT allow you to play content from a device such as your smartphone to a speaker or TV as long as both are connected to the same home network.

Security systems such as alarms and locks can be accessed from an app on your smartphone to control these devices. Home appliances such as refrigerators and or washing machine can be access from an app on your smartphone to control the device or receive status updates.

Computer monitors are controlled by a computing device (such as a laptop or desktop) and are an output device that is not normally associated with IoT.

While headsets can be wirelessly connected to a device (such as a computer, smartphone, or TV), they normally use Bluetooth instead of IoT.

Tablets are mobile computing devices that normally use Wi-Fi technology to connect to the internet and are not normally associated with IoT technology.

Printers can wirelessly connect to a home Wi-Fi network, but they are not normally associated with IoT technology. q_itf_internetofthings_facts_01

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?

Answers:

• *Smart door lock


• Siri


• Smartphone


• TV


Explanation:

Smart door locks are considered IoT devices because they would not typically connect to a video, audio, or data network. Siri is a considered a digital assistant (not an IoT device), is based on AI, and can function on tablets and watches.

While a smartphone relies on a data connection and relies on IP technology, it is not considered an IoT device. TVs can include applications that rely on internet access, but televisions are not considered IoT devices. q_itf2_das_01

What is one of the things that has set Siri apart from other digital assistants? Answers:

• Voice command


• *Easter eggs


• Reminders


• Playing music


Explanation:

One of the things that has set Siri apart are the variety of Easter eggs the developers have worked into the program. Voice command, reminders, and playing music are all available with other digital assistants.

q_itf2_das_02

Which digital assistant was named after an artificial intelligence in an Xbox video game? Answers:

• Siri


• *Cortana


• Alexa


• Google Assistant


Explanation:

Microsoft's Cortana was named after an artificial intelligence in an Xbox video game called Halo. The voice actress for the character in the game reprised her role.

q_itf2_das_03

A major capability of Alexa is its ability to do what? Answers:

• *Control smart devices


• Speak a variety of languages


• Play audio books

• Set alarms


Explanation:

A major capability of Alexa is its ability to control smart devices throughout a person's home, such as lighting, security systems, and even appliances like microwaves.

Other digital assistants can speak a variety of languages, play audio books, and set alarms. q_itf2_das_04

Which of the following can recognize different voices that it records and tailor its responses accordingly? Answers:

• *Google Assistant


• Alexa


• Cortana


• Siri


Explanation:

Google Assistant can recognize different voices that it records and tailor its responses accordingly. q_itf2_das_05

Which digital assistant was one of the earliest? Answers:

• Google Assistant


• Alexa


• *Siri


• Cortana


Explanation:

One of the earliest digital assistants available was Siri, which debuted on the Apple iPhone 4S in 2011. It is now available on a wide variety of Apple devices including the iPad, iPod touch, Apple Watch, AirPods, HomePods, and on Mac Computers that are running macOS Sierra or later.

Amazon released Alexa in 2014, Microsoft released Cortana in 2015, and Google Assistant was released in 2016. q_itf2_das_06

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?

Answers:

• Cortana


• *Alexa


• Google Assistant


• Siri


Explanation:

The sound of Alexa's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek TV

series and movies.

5.8 Online Research Section Introduction

As you study this section, keep the following questions in mind:

• Why is it important to verify that information found online is reliable?


• What are the key differences between scholarly and consumer-level resources?


• When is it appropriate to use primary, secondary, and tertiary sources of information?


After finishing this section, you should be able to:

• Use a search engine to find and evaluate web content. o Use Advanced Search forms. o Use search operators to refine searches.


• Identify reliable academic sources online.


• Distinguish between primary, secondary, and tertiary sources.


• Explain how to avoid plagiarism when using online sources.


Key terms for this section include the following:

Term Definition


Academic Source

Books or articles written by experts who have credentials in a particular field of study.


Consumer-level Source

Resources such as personal websites, online forums, news websites, and online magazines whose audience is consumers of information -- people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues.


Primary Source

Resources such as original speeches, letters, poems, laws, scientific fieldwork, and artwork.


Secondary Source

Resources such as articles or books that review, analyze, or describe primary sources.


Tertiary Source

Resources that compile or summarize material from other sources including bibliographies, abstracts, and online article indexes and databases.


Citation Style

The format used for citing academic sources, including author, date of publication, and journal title.

Plagiarism

The act of taking someone else's work and passing it off as one's own.


5.8.1 Online Searches (Lesson Video) Transcript:

Whether you're researching a topic for an academic paper or trying to figure out how to install a new headlight in your vehicle, the Internet is a great place to start. But even the most powerful Internet search engines may fail to provide reliable answers, especially if you don't have a lot of experience evaluating sources of information. In this video, we'll begin with some general online searching tips. Then we'll talk briefly about evaluating online information.

Let's start with some general tips on finding accurate and reliable information online. In this example, suppose we want to want to find some information about artificial intelligence in the field of robotics. We'll open up a web browser, in this case Google Chrome, and then start searching. You probably already know that you can enter search terms right here in the address bar and the browser will forward them to the default search engine. So I'm going to enter the words artificial, intelligence, and robotics, each separated by a space. When I press Enter, Google brings up what it thinks are the most relevant search results. Here at the top, Google lets us know that these results are advertisements for products or services related to AI and robotics. Since we're looking for reliable, objective information rather than products and services, we'll skip over these. We can also see some related questions that people often ask about these topics, some top news stories, and further down, some related search terms. These can be helpful if we want to narrow our search further.

If we scroll to the bottom of the list, we can see that there are many pages of results. Links to the first ten pages are displayed here. It's usually a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.

Now let's go back to the top of the search results. Notice that we have a few options for narrowing our search to specific result categories. We can click News and see news articles related to AI and robotics. We can also click Images or Videos to view media results.

Another option for narrowing our search is to return to the Search box and add or clarify search terms or to put some or all of the terms in quotations. This tells the search engine to display results containing that exact phrase instead of results that include each of the individual words somewhere in the source.

If we click Settings, we see several other options, including Advanced search. All of the popular search engines have some kind of advanced search option. Here we can see several ways to refine and narrow our search.

The first two boxes show what we've already tried: finding pages that include all words in a list or finding an exact word or phrase. We can also perform a search for any single word within a list or a page that contains none of the words in a list.

Further down, we can see options to narrow the search by language, region, domain, file type, and so on. One important thing to note about advanced search is that these search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.

Now let's talk for a minute about evaluating content.

First tip: since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.

Second tip: if you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or to sell you something? Does the author seem to be overly emotional or making outlandish claims?

Third tip: if you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field.

In this video, we've discussed basic guidelines for performing Internet searches, and we've introduced three tips for evaluating content: fact-check information, investigate an author's possible biases, and for academic or professional research, make sure your sources are well documented and published by experts.

5.8.2 Online Searching Facts

The World Wide Web contains billions of pages of content that have been indexed by online search engines. However, without basic skills in finding and evaluating content, you might still have a difficult time locating the information you're looking for. The table below summarizes general tips for finding and evaluating online information.

Table 1: Online Search Tips

TIP DESCRIPTION


Use the Browser Address Bar

To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine.


Sift Through Search Results

Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider


clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.


Narrow Your Search

At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words.


Use Advanced Search Options

All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.


Verify Facts

Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.


Investigate Author Biases

If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims?


Use Scholarly Sources for Academic Research

If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.

5.8.3 Online Academic Research (Lesson Video) Transcript:

It's always important to carefully evaluate and fact check information you find online. But it's especially critical when you're doing research for an academic paper. In this video, we'll talk about how to find, evaluate, and document online academic sources.

Let's start with some definitions. First of all, what's the difference between academic- and consumer-level sources of information? Academic sources are generally books or articles written by experts who have credentials in a particular field of study. These publications are typically reviewed and validated by other scholars who are experts in the field. This is what it means for an online journal article to be "peer-reviewed." Original scholarly research is carefully documented to show how it builds on the research of other experts. It's published by university presses, professional associations, or academic publishers. You can find academic sources in online versions of textbooks, journal articles, dissertations, conference proceedings, and scholarly books.

Consumer-level sources, on the other hand, tend to be less reliable because they're usually not written or peer-reviewed by experts. They might be published on a personal website, an online forum, a news website, or an online magazine. The audience for these sources is consumers of information – people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues. Consumer-level sources often incorporate rich media content such as online videos and photographs. They're published as news articles, trade magazines, press releases, blogs, wikis, podcasts, and streaming video content.

If you're doing academic research, you might want to use consumer-level sources but primarily to provide background information on your topic of interest. Because this information is probably common knowledge that you can find in multiple places online, you typically don't need to cite it in your paper – as long as you're not quoting passages or borrowing precise wording from these sources.

After you've acquired sufficient background information on a scholarly research question, you should focus almost entirely on academic sources.

Most academic sources can be divided into two main categories: primary and secondary. Primary sources include things like original speeches, letters, poems, laws, scientific fieldwork, and artwork. Secondary sources are articles or books that review, analyze, or describe primary sources. There's also a third category called tertiary sources, which compile or summarize material from other sources. Tertiary sources include bibliographies, abstracts, and online article indexes and databases. Online encyclopedias like Wikipedia are also considered tertiary sources.

For academic research, tertiary sources are good places to find references for both primary and secondary sources. Online databases such as LexisNexis, JSTOR, Academic Search, and Google Scholar all provide search engines designed for locating academic sources. Most of these databases require a subscription, which is usually one of the benefits of having a college or university login. Some academic databases, such as Google Scholar, are available online for free.

To access Google Scholar, open a web browser and enter scholar.google.com into the address bar. From here, we can enter a list of search terms based on our research interests. If we wanted to find a recent scholarly article on water rights in Malaysia, we just enter the list of terms and press Enter. To narrow our search, we can adjust the date range of articles. We can also refine our search results by selecting the Advanced search option. In this case, we'll search for "water rights" as an exact phrase, along with Malaysia. This is the same as putting quotation marks around "water rights." From here we can start skimming through abstracts until we find the most relevant articles.

One of the main reasons to use online academic databases is that you can be confident that the content of the article or book is reliable and accurate. If you use articles found through a regular Internet search engine, you carry a much heavier burden in verifying the author's credentials, identifying possible biases, and checking facts for accuracy.

A common question students have when using online research is how to cite sources. Like any other academic assignment, you should check with your instructor to confirm the preferred citation style, such as MLA, APA, or the Chicago Manual of Style. Most instructors will not require that you include a reference to the online database you used to locate a source. If you use an online database, you can usually find a convenient bibliographic reference either next to the abstract or on the first page of the article's PDF.

In this video, we discussed the difference between consumer-level and scholarly sources of information. We also defined primary, secondary, and tertiary sources, and we provided a few tips for finding, evaluating, and citing online academic sources.

5.8.4 Online Academic Research Facts

When doing academic research online, it's important to carefully evaluate and fact check information. You also need to know where to look for the most reliable academic sources and how to properly cite them in a research paper. The table

below describes key terms associated with online academic research. Table 1: Online Academic Research

TERM DEFINITION


Academic Source

Academic sources are generally books or articles written by experts who have credentials in a particular field of study. These publications are typically reviewed and validated by other scholars who are experts in the field. This is what it means for an online journal article to be "peer-reviewed." Original scholarly research is carefully documented to show how it builds on the research of other experts. It's published by university presses, professional associations, or academic publishers. You can find academic sources in online versions of textbooks, journal articles, dissertations, conference proceedings, and scholarly books.


Consumer-level Source

Consumer-level sources are usually not written or peer-reviewed by experts. They might be published on a personal website, an online forum, a news website, or an online magazine. The audience for these sources is consumers of information — people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues. Consumer-level sources often incorporate rich media content such as online videos and photographs. If you're doing academic research, you might want to use consumer-level sources, but they should be used primarily to provide background information on your topic of interest.


Primary Source

Primary sources include things like original speeches, letters, poems, laws, scientific fieldwork, and artwork.


Secondary Source

Secondary sources are articles or books that review, analyze, or describe primary sources.


Tertiary Source

Tertiary sources compile or summarize material from other sources. They include bibliographies, abstracts, and online article indexes and databases. Online encyclopedias like Wikipedia are also considered tertiary sources. For academic research, tertiary sources are good places to find references for both primary and secondary sources. Online databases such as LexisNexis, JSTOR, Academic Search, and Google Scholar all provide search engines designed for locating academic sources.


Citation Style

A citation style prescribes the format you should use for citing academic sources, including author, date of publication, and journal title. Like any other academic assignment, you should check with your instructor to confirm the preferred citation style, such as MLA (Modern Language Association), APA (American Psychological Association), or the Chicago Manual of Style.


Image 1: Google Scholar Advanced Search


Google Scholar advanced search options. Screenshot.

5.8.5 Avoiding Plagiarism

Plagiarism is defined as taking someone else's work and passing it off as one's own. The word comes from the Latin root "plagiare," which means to steal. Plagiarism is considered an act of fraud and is the most frequently violated offense under most schools' academic code of conduct. In this lesson, we'll go over some different types of plagiarism to help you understand how to best avoid each one.


A thief hiding behind a wall copying a design found on the user's computer in front of him. Illustration.

History of Plagiarism

The word "plagiary" was introduced into the English language in 1601. By the mid-1600s, allegations of plagiarism were common in every field, though not regarded as a problem until the 1700s. The first English copyright laws were passed in 1709 at a time when storytellers began to print literary works and society began to place a high price on their uniqueness.

Today, many copyright laws are still based on those laws passed back in the 1700s. With the evolution of technology and science, these laws have been expanded to cover online, video, and musical works. Though plagiarism is considered an offense against the original author, a copyright violation is typically an offense against the copyright holder, which nowadays is typically not the same person as the author. In many cases, a copyright violation and plagiarism are basically the same.

Common Types of Plagiarism

There are many different types of plagiarism and most carry the same consequences. Let's discuss the different types and possible penalties that can follow.

Direct Plagiarism

Direct plagiarism is a word-for-word copy of someone else's work. This type of plagiarism can be avoided by citing or annotating the author in your work. Citing your sources also makes your work credible and can help you back up your research. The Modern Language Association (MLA), an organization created to develop rules on proper language and literature structure, has guidelines on how to properly cite your work. There are even websites like citationmachine.net that can help you easily create an MLA-formatted citation. Not citing your sources is an unethical form of writing and many schools' academic codes of conduct state that it can result in expulsion.

Self-Plagiarism

Self-Plagiarism is a lesser-known type of plagiarism. This is when someone submits their own previous work (or parts of it) without permission from all involved, typically a professor. A common example is someone submitting the same paper from high school for a college class. This type of plagiarism is harder to catch but is still considered unethical.

Mosaic Plagiarism

Mosaic plagiarism, or "patch writing," is similar to direct plagiarism. The difference is that it occurs when someone copies phrases from someone else's work and doesn't use quotation marks or a citation for the source. Mosaic plagiarism can also occur when synonyms are used to replace words while keeping the meaning of the original phrase. This type of plagiarism is also considered unethical and can have academic consequences if caught.

Accidental Plagiarism

Accidental plagiarism occurs when a person fails to quote (or misquotes) their sources unintentionally. This can also be inadvertently done by using comparable wording or sentence structure. Despite being unintentional, accidental plagiarism can carry the same consequences as other types of plagiarism.

Avoiding Plagiarism

Today there are numerous online tools that can help you avoid plagiarism by carefully scanning content and comparing it with your work. Copyleaks is a plagiarism-checker application that detects plagiarized and paraphrased content with AI technology. You can also avoid plagiarism by simply being careful to properly cite your sources and not use past literary works in your current writing. Following these guidelines will assure that your work is honest and ethical and will help you avoid unnecessary penalties in your future endeavors.

5.8.6 Performing Advanced Searches (Lesson Video) Transcript:

For the most part, using a search engine is pretty simple – just type in the thing you want to find, and press enter. However, there are techniques you can use to make your searches even more effective. We'll go over a few of them in this video.

Let's say we want to learn about the Apple Automobile Company, which was a car manufacturer from Dayton Ohio in the early 1900s. If we go to Google and search for Apple Automobile Company, all our results are pages about the modern Apple computer company. That's because Google's algorithm knows that most people searching for the words Apple and Company want the computer company.

To fix our problem, we can put our search term in quotes. Quotes tell the search engine to only return results that contain the exact phrase in the search. In this case, it'll only return pages that have the words "Apple Automobile Company" in that exact order. When we press enter, the new results are pages about the car company.

Next, let's look for a YouTube video of a wrecking ball demolishing a building. Sounds pretty easy, right? However, if we just look for wrecking ball, most of our results are videos about the Miley Cyrus song, which isn't really what we're after. To filter out these irrelevant results, we can add Minus Miley to our search. The minus tells the search engine to

ignore any results that contain that term. When we hit Enter, YouTube gives us a demolition video near the top.

For our last example, let's search for Mars. When we press enter, we get results from a variety of websites. Let's modify this search so we only get results from the NASA website. To do this, we start by typing the word site, a colon, and the domain we want to search. Then we type our search terms like normal. When we hit enter, all of our new results are from the nasa.gov domain.

Some search engines like Google provide an Advanced Search form that filters search results based on the options you select. This Google search page lets you do everything we've already discussed and more, including finding pages in a particular language or region.

In this video, we learned a few tips for customizing online searches. We learned about using quotes to find an exact phrase, using minus to exclude a search term, limiting searches to a specific domain, and using an Advanced Search form.

5.8.7 Activity: Perform Advanced Searches

In this activity, you'll use advanced search techniques to help you learn more about a specific topic that interests you. Do the following:

1. Open a new tab in your favorite web browser.


2. In the address bar, enter one or more search terms on a topic that interests you. For example, you could enter something like "information technology certifications."


3. Try limiting your search by including quotes around your search terms.


4. Limit your search further by adding a minus sign after your search terms followed by a related topic that you don't want included in your search.


5. Try using an advanced search form to further refine your search (e.g. google.com/advanced_search ).


6. Follow the same steps to learn about another topic.


5.8.8 Section Quiz (Section Quiz) q_itf_onlineSearch_facts_01

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet?

Answers:

• Enter a package tracking number to find out a package status.


• Enter a MAC address to find out which device it is assigned to.


• *Enter one or more search terms for a topic.


• Enter the filename of a file on your local hard drive to view the file.


Explanation:

Entering one or more search terms in the web browser address bar forwards them to the default search engine and returns information and URLs about the search terms, which you can use to continue exploring the internet.

Entering a package tracking number by itself will not return any link to find out more about your package status. You need to add terms such as "package tracking number UPS" and the number to find out the status.

Entering a MAC address will display information such as the company issuing the address, but will not display the device assigned to the MAC address.

Entering only the filename of a local file will not give you access to the file. But you can include the fully qualified domain name with the filename (such as C:\history\photos\blueskies.jpg) to access the file.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.2. q_itf2_onlineResearch_01

Wikipedia is considered which of the following sources? Answers:

• Primary


• Academic


• *Tertiary


• Consumer-level


Explanation:

Primary sources include things like original speeches, letters, poems, laws, scientific fieldwork, and artwork. Secondary sources are articles or books that review, analyze, or describe primary sources. There's also a third category called tertiary sources, which compile or summarize material from other sources. Tertiary sources include bibliographies, abstracts, and online article indexes and databases. Online encyclopedias like Wikipedia are considered tertiary sources. Academic sources are generally books or articles written by experts who have credentials in a particular field of study. Consumer-level sources tend to be less reliable because they're usually not written or peer-reviewed by experts. q_itf_onlineresearch_academ_facts_01

Which of the following is most likely to have peer-reviewed material written by an expert in the field? Answers:

• *Academic journal


• Newspaper


• Library book


• Cable news channel


Explanation:

Academic journal articles are written by experts in their fields and usually have to be reviewed by a panel of experts to assess the validity of their methods and conclusions before being published.

Library books, newspaper articles, and cable news stories are generally written for a consumer-level audience and do not face the rigor that is expected of academic articles.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_onlineresearch_academ_facts_02

Which of the following are primary sources? (Select two.) Answers:

• *The United States Constitution


• *Jane Austen's Pride and Prejudice


• Documentary about the Great Depression


• Newspaper article about new legislation


• Encyclopedia entry on wolves


Explanation:

Primary sources provide direct or firsthand evidence about a person, event, object, or work. Secondary sources provide insight and analysis about primary sources.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_onlineresearch_academ_facts_03

Which of the following is the BEST reason to search for articles in an online academic database? Answers:

• *The sources are more likely to be peer reviewed


• The sources contain a wider range of practical knowledge


• The sources generally provide better background information on topics


• The sources are more likely to include streaming video content


Explanation:

One of the main reasons to use online academic databases is that you can be confident that the content of the article or book is reliable and accurate. Articles are much more likely to have been peer reviewed by experts. If you use articles found through a regular Internet search engine, you carry a much heavier burden in verifying the author's credentials, identifying possible biases, and checking facts for accuracy. However, consumer-level sources generally contain a wider range of practical knowledge, background information on topics, and media-rich content such as streaming video.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_onlineresearch_academ_facts_04

Which method should be used to search for an exact phrase? Answers:

• *Put the search terms in "quotes"


• Put the search terms in [brackets]


• Put the search terms in (parentheses)


• Put the search terms in <angle brackets>


Explanation:

To search for an exact phrase, put the search terms in quotes. For example, searching for "Banana pudding" will return only results that contain the words banana and pudding together. Searching for Banana pudding will return results that have the word banana and the word pudding, even if they're not together.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_onlineresearch_academ_facts_05

Match each source on the left to its source type on the right. Answers:

• Primary source


• Secondary source


• Tertiary source


Explanation:

The transcript of a speech by the mayor is a primary source because it provides a firsthand account of an event.

A news article about the mayor's speech is a secondary source because it provides insight into the speech, which is a primary source.

A catalog of all the mayor's speeches and news articles about them is a tertiary source because it serves as an index of primary and secondary sources.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf2_plagiarism_01

You submitted the same paper from high school for a college class. Which form of plagiarism is this? Answers:

• Direct


• *Self


• Mosaic


• Accidental


Explanation:

Self-plagiarism is not a well-known type of plagiarism. It occurs when an individual submits their own previous work or uses parts of their past work without permission from all involved (typically a professor).

Direct plagiarism is a word-for-word copy of someone else's work.

Mosaic plagiarism, or patch writing, is similar to direct plagiarism but occurs when someone copies phrases or lines from someone else's work and does not use quotation marks or cite their source.

Accidental plagiarism occurs when a person fails to quote or misquotes their sources unintentionally. q_itf2_plagiarism_02

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in?

Answers:

• Accidental


• *Mosaic


• Direct


• Self


Explanation:

Mosaic plagiarism occurs when synonyms are used to replace words while keeping the meaning of the original phrase. Self-plagiarism is not a well-known type of plagiarism. It occurs when an individual submits their own previous work or uses parts of their past work without permission from all involved (typically a professor).

Direct plagiarism is a word-for-word copy of someone else's work.

Accidental plagiarism occurs when a person fails to quote or misquotes their sources unintentionally. q_itf2_plagiarism_03

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in? Answers:

• Direct


• *Accidental


• Self


• Mosaic

Explanation:

Accidental plagiarism occurs when a person fails to quote or misquotes their sources unintentionally. This can also be inadvertently done by using comparable wording or sentence structure.

Direct plagiarism is a word-for-word copy of someone else's work.

Self-plagiarism is not a well-known type of plagiarism. It occurs when an individual submits their own previous work or uses parts of their past work without permission from all involved (typically a professor).

Mosaic plagiarism occurs when synonyms are used to replace words while keeping the meaning of the original phrase.

5.9 Internet Technology Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of internet technology professionals affect my daily life?


• How can I prepare for a career in internet technology?


This section describes common careers in internet technology. After finishing this section, you should be able to:

• Describe common careers in designing and configuring internet technologies, including web design, social media marketing, and internet service support.


• Identify skills and educational requirements for internet technology careers.


Key terms for this section include the following:

Term Definition


Web Designer

An IT professional who employs skills in color, font, layout, and images to create appealing and useful websites.


Social Media Marketer

A professional who uses creative and technical skills to create content for social media platforms in order to reach and influence current and potential customers.


Internet Service Technician

A professional who works with telecommunications equipment and hardware to build infrastructures for networking, telephones, radio, and other communications channels.


5.9.1 Internet Technology Careers (Lesson Video) Transcript:

Imagine a world with no internet. It would be almost unrecognizable. The Internet has become a vital part of our society, our economy, and our everyday lives that it's hard to imagine things going back to the way they were before. In this video, we'll look at a few specifically internet-focused careers.

Web designers create, update, improve, and maintain web pages. They're in charge of the look and feel of a website, which needs to stay up to date with the latest trends in design. Web designers have a well-developed sense of color, font, layout, and images, which all work together to make a website appealing and useful. In addition to good design sense, web designers also need to be proficient in front-end coding languages like HTML, CSS, and JavaScript.

The use of social media has changed dramatically over the years. It started as a way of connecting with friends and family, but today most companies and corporations have a social media presence. Using their creative skills, social media marketers write and edit content for social media platforms like Facebook, Instagram, LinkedIn, and YouTube. Creative content ideas can be communicated through a photograph, a blog post, a video, or any other innovative

medium. Social media marketers also need skills in Search Engine Optimization and web traffic metrics. And they must have excellent communication skills and ability to collaborate across teams.

An Internet service technician works with telecommunications equipment and hardware. They build infrastructures for networking, telephones, radio, and other communications channels. If you've ever switched Internet providers, an IST probably came to your house to add the correct wiring and network adapters. The most important skill that a technician can possess is the ability to quickly troubleshoot and fix any issues that may arise from customers. They need to be quick problem solvers and have great communication and customer service skills.

In this video we talked about some of the exciting careers in Internet Technology: Web designer, Social Media marketer, and Internet service technician. The internet isn't going to disappear anytime soon, so jobs will be available in this field for many years to come.

5.9.2 Internet Technology Career Facts

Many IT professionals spend the majority of their time designing, installing, supporting, or simply using internet technologies. From web design and social media marketing to telecommunications expertise, the internet requires an army of professionals trained in both internet service support and content development. This lesson overviews a few common careers that focus on internet technology.

Table 1: Internet Technology Careers Job Title

Description


Web Designer

Web designers create, update, improve, and maintain web pages. They're in charge of the look and feel of a website, which needs to stay up to date with the latest trends in design. Web designers have a well-developed sense of color, font, layout, and images, which all work together to make a website appealing and useful. In addition to good design sense, web designers also need to be proficient in front-end coding languages like HTML, CSS, and JavaScript.


Social Media Marketer

The use of social media has changed dramatically over the years. It started as a way of connecting with friends and family, but today most companies and corporations have a social media presence. Using their creative skills, social media marketers write and edit content for social media platforms like Facebook, Instagram, LinkedIn, and YouTube. Creative content ideas can be communicated through a photograph, a blog post, a video, or any other innovative medium. Social media marketers also need skills in Search Engine Optimization (SEO) and web traffic metrics. And they need excellent communication skills and the ability to collaborate across teams.


Job Title Description


Internet Service Technician

An Internet service technician works with telecommunications equipment and hardware. They build infrastructures for networking, telephones, radio, and other communications channels. If you've ever switched Internet providers, an IST probably came to your house to add the correct wiring and network adapters. The most important skill that a technician can possess is the ability to quickly troubleshoot and fix any issues that may arise from customers. They need to be quick problem solvers and have great communication and customer service skills.


5.9.3 Interview: Social Media Marketer (Lesson Video) Transcript:

I had a lot of art background, I had an interest in science, I just had an insatiable curiosity.

And I've been doing marketing, marketing directing, and dabbling in all sorts of disciplines in marketing for over 20 years. Every day it seems like there's something exciting, some challenge, some problem I get to solve. You know, what

happens if we do this? What happens if we pull this in? I kind of feel like I get to be like an alchemist, to try to find, like, what is that cool new solution gonna be, and so I think that's really fun.

My main job is to build relationships with people so I'm constantly trying to strategize, constantly trying to be creative and problem solve, to find ways that I can make that connection that's gonna be valuable to them. I feel like the skills that you need to be a good digital marketer cover like a lot of disciplines. Personally you need to be somebody who's curious, who's really interested in people, and then I also think you need to be a creative person. Not necessarily that you're a great musician or a great artist, but you need to be able to find innovative ways to problem solve. You can't just always do the same thing over and over again.

You need to be able to be good with technology. In today's world you can't just talk one to one with people, you're usually talking to thousands of people at the same time. So you need to be able to know how to leverage technology so that you can have a one-on-one personal conversation with someone but yet do it on a mass scale. And so you need to be able to use automation technology.

Social media marketing is a really powerful tool when it comes to marketing. It really allows you to expand your scope of the people that you can reach. I feel like every time I'm doing some kind of campaign, I want to have a social media element to it. It's very low cost, and it has a huge reach, and there's just incredible things you can do with it. And so it's really important to master that medium of social media.

I think there's so many different routes to get into marketing. You could take a straight, you know, I'm gonna get my degree in marketing. A lot of people can be brought into marketing because they have a personal interest. Maybe like in sports or in health, and they just find that they have an enthusiasm for it. The most important thing you can do to get your dream job is to build up your portfolio. And I think in order to do that you need to constantly be looking for volunteer opportunities, organizations that you can help, and just be able to collect those campaigns and those content pieces that you created. Really go after the type of job that makes you excited. I think really just finding your passion and what it is you care about is really the most important thing.

5.9.4 Section Quiz (Section Quiz)

6.0 Networking

6.1 Chapter Introduction


A map of the world with a router in the center connecting people across the globe through messages, videos, and other technology. Illustration.

Networking

This chapter introduces concepts and best practices associated with computer networking. It describes devices, standards, and protocols used in both wired and wireless networking. Students practice installing and configuring network devices, setting up secure internet connections, and troubleshooting network connection problems. The chapter concludes with a brief look at common computer networking careers.

After finishing this chapter, you should be able to:

• Describe standard networking devices, interfaces, and protocols.


• Install, configure, and troubleshoot networking hardware and software.


• Configure computer devices to connect to both wired and wireless networks.


• Configure a wireless infrastructure for internet connectivity.


• Configure a virtual private network (VPN).


• Describe how software applications can be delivered to users over a network.


• Identify common careers in computer networking.


6.2 Networking Basics Section Introduction

• What hardware components are needed for a wired network? A wireless network?

• What roles do servers play on a network?


• What is the difference between a LAN and a WAN?


This section introduces you to computer networking devices and gives you practice setting up wired network connections. After finishing this section, you should be able to:

• Define some advantages of computer networking.


• Explain the difference between a local area network (LAN) and a wide area network (WAN).


• Describe common network topologies, including bus, ring, star, and mesh.


• Explain the role of clients and servers on a network.


• Describe standard devices and interfaces used in wired networking.


• Describe standard devices and interfaces used in wireless networking.


• Describe different network storage options.


• Select and install a network interface card.


• Use an appropriate network cable to connect a computer to the local network.


• Use Network & Internet settings in Windows to confirm that a workstation is connected to the local network and the internet.


Key terms for this section include the following:

Term Definition


Network Interface

A computer component that provides a port (usually RJ-45) where a network cable can be connected.


Network Cable

A cable that provides connectivity between network devices. A common network cable connects a computer's network interface with a wall jack.


Wall Jack

A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device.


Local Area Network (LAN)

A group of networked computers that are physically close together, usually in the same building.


Wide Area Network (WAN)

A network of interconnected LANs across a large geographical location.


Metropolitan Area Network (MAN)

A network that covers a larger geographical area than a LAN, but is usually as large as a WAN. The term generally refers to smaller networks that are connected throughout a city into one larger, centralized network.

Internet Service Providers (ISP)

Internet Service Providers (ISP) are organizations that provide many services for accessing and using the Internet.


Bus Topology

A network topology in which all the devices are connected to each other by a single central cable.


Ring Topology

A network topology in which each host is connected to two other hosts in a circle.


Star Topology

A network topology in which devices are not connected to each other but rather to a centralized device called a switch.


Mesh Topology

A network topology where each device on the network has a point-to-point connection to every other device on the network. This topology was previously just theoretical until the rise of smart devices and wireless connecting media which allowed devices to communicate directly to every other device through one network adapter in each device using radio signals and wireless network adapters.


Physical Address

The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device's MAC address.


Logical Address

An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.


Default Address Class

A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.


Internet Protocol (IP)

The principal communications protocol in the internet protocol suite that is used to route information over the internet.


Modem

Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable television lines.


Router

A network device that moves traffic between two different IP networks.


Switch

A network device that moves traffic within an IP network.


Access Point

A network device that connects wireless devices to a wired network.


Firewall

A network security device that protects a network by examining the traffic before transferring it to the network.

Home Router

A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.


Registered Jack 11 (RJ-11) Interface

A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.


Registered Jack 45 (RJ-45) Interface

A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network.


Bluetooth

A technology used to create wireless connections between computers and devices.


Radio Frequency ID (RFID)

Radio Frequency ID, or RFID, a technology typically used for tacking objects. There are two types of RFID, passive (does not require power) and active (does require power). Passive RFID tags can be embedded in labels and sticker which is helpful for tracking objects.


Near Field Communications (NFC)

A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store.


File Server

A computer that provides network access to shared disk storage.


Mail Server

A computer that provides email services to a network.


Web Server

A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages.


Database Server

A computer that stores databases, which are huge repositories of organized data.


Gaming Server

A computer that provides a gaming environment that tracks events in multiplayer video games.


Client

A host on a network that consumes network services.


Server

A host on a network that provides network services.


Client-Server Model

A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers.


SOHO

A LAN that only services a home or small business, it is sometimes referred to as a Small Office Home Office, or SOHO.

6.2.1 Introduction to Networking (Lesson Video) Transcript:

A network is a group of computer systems that are interconnected so they can share information with each other. The computer you're using to watch this video has a network connection to the computer the video file is stored on. In this video, we'll look at the components of a network, then compare different kinds of networks.

To create a network, four things are required. First, and most obvious, are the computers themselves. Second are network media, or the physical means of transmitting data from one computer to another. The most common network media are wires and radio signals. Third are network interfaces. These are devices installed on each computer that can send and receive signals through the network media. Fourth are network protocols. For computers to speak to each other, it's important that one computer sends data in a way that the other computer can understand. Protocols are rules that computers on a network must follow to send and receive data.

Now, we'll look at two kinds of networks – local area networks and wide area networks. A local area network, or LAN, is a group of connected computers that are physically close together, usually in the same building. The computers in your office, school, or library are most likely connected to each other on a LAN. In the late ‘90s and early 2000s, gamers would throw LAN parties, where people brought their computers or gaming consoles to the same room to play multiplayer video games across a LAN connection.

Wide area networks, or WANs, are networks of interconnected LANs across a large geographical location. A WAN can cover a city, a state, a country, or even the entire world.

Networks can be either public or private. A private network can only be accessed by computers inside the network. This is essential for businesses that want their employees to have access to the files they need for work but don't want people from outside the company snooping around in their data. Public networks can be accessed freely by anybody. The most important public network is a huge, worldwide system of interconnected networks called the Internet.

In this video, we learned about computer networks. We talked about the components a network needs, then looked at LANs, WANs, private networks, and public networks.

6.2.2 Basic Networking Facts

A network is a group of computer systems that are interconnected to share information with each other. Several key components must be in place for two computers to communicate over a network.

• Network media must be used to connect the computers. This is usually done with copper wiring or radio signals.


• A network interface must be installed in each computer to connect it to the network media.


• Network protocols must be configured on each computer. The same protocol must be configured on all computers in the network for them to communicate with each other.


Wired Networking Components

To connect to a network that uses copper wiring, you need to connect the following components: Table 1: Wired Networking Components

COMPONENT DESCRIPTION


Network Interface RJ-45 port.

The network interface provides an RJ-45 port into which a network cable can be connected. On desktop computers, this port is usually found on the back. On notebooks and laptops, it is usually found on the side of the system.


Network Cabling Network cat6 cable.

The network cabling connects the computer to the wired network. One end of the cable connects to the RJ-45 port on

the computer. The other end connects to the RJ-45 port in the wall jack.


Wall Jack Wall jack.

The wall jack has an RJ-45 port that provides a connection to the wired network. It appears similar to a telephone wall jack but is larger in size.


Wired Connection Verification

For Windows-based systems, Microsoft has provided several methods for determining if a computer is connected to the network as well as the internet. One method is the use of an icon shown in the notification area of the taskbar. When using a wired configuration, the type of icon shown gives you an indication of the connectivity status. The following table shows the types of icons used on Windows 10:

Table 2: Wired Networking Icons ICON

DESCRIPTION


Wired connection icon.

When the icon is an image of a computer, the computer has a connection to the network and to the internet.


Wired no connection icon.

When the icon is an image of the world with a no-access symbol, the computer may:

• Have access to the local network, but not have access to the internet.


• May not have access to the local network or the internet.


Be aware that on older versions of Windows, Microsoft used a red circle with an X to indicate that the computer's cable is not connected properly or some other device, such as a router is preventing access to the network. In addition, a yellow triangle with a black explanation mark can indicated that


the IP address is improperly configured and preventing the computer access to the internet.


Most computers obtain their IP address information (IP address, subnet mask, default gateway, and DNS servers) from a server configured to use the Dynamic Host Configuration Protocol (DHCP) server.

For a more accurate description of the computer's connectivity, you should open Microsoft's Settings app and access the Network & Internet option. When you do this, the default status page will show you the network status as follows: Table 3: Windows Settings App Network & Internet Status

STATUS OPTIONS DESCRIPTION


Network Status image for no connection

No connection to a network or internet is detected.

Network Status image for connection to network only

A connection to a network is detected, but the computer does not have access to the internet.


Network Status image for connection to network and Internet A connection to a network and the internet is detected.


Wireless Networking Connection

Some networks use radio signals to communicate instead of copper wiring. They are called wireless networks. The process for connecting to a wireless network is a little more complex, as described in the following table.

Table 4: Wireless Networking Connection TASK

DESCRIPTION


Enable a wireless network interface

To connect to a wireless network, a computer must have a wireless network interface available. Different platforms have different types of wireless options available.


USB wireless network interface.

• On desktop systems, you must typically install a wireless network interface. The easiest way to do this is to insert a USB wireless network interface into an available USB port.


• Most notebook and laptop systems provide an integrated wireless network interface, so you do not need to install one. However, you may need to switch it on. Most notebook and laptop systems provide a button or switch that enables or disables the wireless network interface.


Connect to a secure wireless network

Once you have created a network connection, you can connect to the wireless network.

1. Verify that the wireless interface is enabled.


2. Click the Network icon in the system tray. A menu is displayed that lists all detected wireless networks.


3. Select a wireless network and click Connect .


4. Enter the network security key or password and click Next .


5. In most cases, click No to set your network connection as private.


Network Categories

The following tables describes several categories of networks. Table 5: Network Categories

CATEGORY DESCRIPTION


Local area network (LAN)

A LAN is a group of connected computers that are physically close, usually in the same building. The computers in your office, school, or library are probably connected to each other on a LAN.


Wide area network (WAN)

WANs are networks of interconnected LANs across a large geographical location. A WAN can cover a city, a state, a country, or even the entire world.


Private

A private network can be accessed only by computers inside the network. This is essential for businesses that want employees to have access to the files they need for work and want to provide a high level of data protection.


Public

Public networks can be accessed freely by anybody. The most important public network is the worldwide system of interconnected networks called the internet.


6.2.3 Network Types

A network is created when two or more computers are connected. Networks were first developed during the 1960s to be used by colleges, universities, and research facilities. With the advent of Ethernet technology in the 1970s and 1980s, networks could finally be commercially available to businesses and private consumers.

There are several different types of networks, each categorized by their size and purpose. The kind of network you'll need to create depends largely on your reason for creating it. The main networks types you'll have to choose from are local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs).

LAN (Local Area Network) LAN Diagram


Company office LAN connected to multiple computers, routers, switches, printers, and phones. Illustration.

LAN has the word "local" in the title because it's a network of connected devices localized in a single physical location, such as in a single office building, private residence, or other business. Just because it only covers a single physical location doesn't mean that a LAN can't be quite large. A LAN can range in size from a few devices in someone's home to thousands of users in a large company under the same roof.

LANs can connect devices by Ethernet cables (a wired connection) or over Wi-Fi (a wireless connection). There are many benefits to setting up a LAN, including the following:

• Devices can share a single Internet connection


• Devices can print to shared printers


• Devices can share files with one another


• Devices can access or control each other if needed


WAN (Wide Area Network) WAN Diagram


WAN connected to four different office LANs. Illustration.

WAN stands for wide area network, which means that it's made up of a larger geographical area than a LAN. In fact, it connects multiple LANs to create a much larger network. For example, if you have a company that has a headquarters

and branch offices spread across different cities, each branch will have its own LAN, and all these company LANs will be connected into the larger WAN. A router is usually used to make the connection between a LAN and a WAN, but sometimes dedicated telecommunication lines are used as well.

WANs provide many advantages, such as allowing all users in a company to use the same applications, firewalls, and resources. This is beneficial because otherwise each of these things would have to be installed on individual machines. This would end up being much more time consuming and expensive.

Many WANs are used in conjunction with a virtual private network (VPN). A VPN allows users in remote locations to use the Internet to connect to a WAN and access all the network resources as though they were in their company's main office or whatever central location was set up. The VPN keeps the network private through data encryption so that you have to log in in order to access the contents.

When you think about it, the Internet itself is simply a very large WAN that connects thousands of LANs all over the world.

MAN (Metropolitan Area Network)

A MAN is kind of network that covers a larger geographical area than a LAN, but isn't usually as large as a WAN. The term is generally used with smaller networks connected throughout a city into one larger, centralized network. Large cities such as London and Geneva have created MANs, but large universities also refer to their networks as MANs due to their size and complexity.

The following chart summarizes the similarities and differences between these three types of networks. Table 1: Network Type Summary

Network Type Full Name Composition/Area

Features/Advantages


LAN

local area network

• Fewer devices


• Share files


• Share printers


Network Type Full Name Composition/Area

Features/Advantages


• Limited geographical area


• Share control of devices


MAN

metropolitan area network

• Many devices

• Larger geographical area such as a city or campus


• Similar to a LAN


WAN

wide area network

• Connected LANs


• Very large geographical area


• Uses VPNs


• Share applications


• Share firewalls


6.2.4 Network Topologies (Lesson Video) Transcript:

In this lesson, we're going to learn about network topologies. A network topology is the way hosts are connected to each other in a network.

Let's begin with the bus topology, which is where all the devices are connected to each other by a single central cable. Let's say the red computer wants to send a message to the orange one. It would send the message down this main cable and all of the computers would receive it. Since the message is for orange, the other computers would throw the message away, but the orange computer would keep it.

Unfortunately, the bus topology has a major downside – if two computers try to send a message at the same time, their data will collide on the wire and be corrupted. This can lead to much slower transmission times, especially as the network adds more hosts.

Next, let's look at the ring topology. In a ring topology, each host is connected to two other hosts in a circle. In this network, if red wants to send a message to green, it'll send it out on this wire. When blue gets the message, it'll realize it's not the intended recipient and pass it along, and so on until it gets to green.

Ring topologies are generally fine for small networks, but they are difficult to implement for large networks. Ring and bus topologies were commonly used in the early days of networking but aren't commonly seen today. Nowadays, you're much more likely to see star and mesh topologies.

In a star topology, the computers aren't directly connected to each other. Instead, they connect to a device called a switch. The switch's job is to route data to the correct destination host. Let's say Orange wants to send a message to Purple. The message goes down this wire to the switch. Then, the switch sends the message along to the Purple computer. This way, the other computers on the network don't have to bother checking whether the message is intended for them.

The switch also prevents data from colliding. Even if two computers send a message at the same time, the switch makes sure all the data gets routed effectively. Star topologies are also easy to implement. To add a new host, all you have to do is plug it into an empty port on the switch.

Finally, let's look at the mesh topology, where each device on the network has a point-to-point connection to every other device on the network. For example, each of four computers has a direct connection to the other three computers. The more computers you add, the more connections you need.

Until recently, the mesh topology was theoretical. In order to create the point-to-point connections between every computer on the network, each device would need a separate network adapter for every other device on the network. For

example, if you had 50 devices on a network, each device would need 50 network adapters and 50 wires, making this topology impractical to implement.

However, with the rise of smart devices and wireless connecting media, the mesh topology became practical. By using radio signals and wireless network adapters, you need only one network adapter in each device. In a mesh topology, each device can communicate directly with every other device.

In this video, we learned about four network topologies. We first looked at bus and ring topologies, which are no longer commonly used. We then looked at star topology, which is by far the most common today. Finally, we looked at mesh topology, which is used by some wireless networks.

6.2.5 Device Addresses (Lesson Video) Transcript:

For a computer to send or receive information on a network, it needs a network address. You can think of a network address in much of the same way as a mailing address. When you order a pizza, the delivery guy needs know your city, street number, and house number. All of these numbers together comprise your address. Network addresses work much in the same way. They are composed of different parts. Each part lets other devices know where information goes.

Network addresses, like mailing addresses, need to be unique. No two devices on the same network can have the same network address.

In this video, we'll look at two types of networking addresses: The physical address and the logical address.

The physical address of a device is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device's MAC address.

An important feature of MAC addresses is that they are globally unique, like snowflakes or fingerprints. No two network interfaces in the world have the same MAC address.

An example of a MAC address is 00-09-5B-36-C2-93. Notice that this MAC address is in hexadecimal form. MAC addresses are a 48-bit binary number. However, as a human, you will always work with MAC addresses as a 12- character hex number.

MAC addresses are typically composed of six groups of two hexadecimal digits separated by hyphens or colons. The first six characters of any MAC address are used to identify the manufacturer of the device, and the last six identify that particular network interface. By using these two number sets, the manufacturer and the interface, no two network interfaces will ever have the same MAC address.

Logical addresses are assigned by software, and as such, can be changed. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.

For example, let's look at this small network with some computers, a printer, and a server. Each of these devices would have its own IP address. The format for an IP address is four numbers between 0 and 255, separated by periods. Each segment of the address is called an octet. This is because in binary, each section is represented by eight digits – from eight zeros all the way up to eight ones, which is the same as 255 in decimal.

This number format is called IP version 4. It works great, with one small problem – as more devices connect to the Internet, we'll eventually run out of available IP addresses. To solve this problem, the Internet is transitioning into a new format called IP version 6. IPv6 addresses are expressed as a 32-character hex number, like this. IPv4 has about four billion potential addresses. IPv6 has, well, a lot more. That's 340 undecillion, in case you were curious.

In this video, we looked at network addresses. Each device has a physical address, or MAC address, and a logical address, or IP address.

6.2.6 Device Address Facts

For a computer to send or receive information on a network, it needs a network address. You can think of a network address in the same way as a mailing address. A mailing address needs to include a state, city, street, and house number. Network addresses work similarly in that they have different parts. Each part lets other devices know where information goes. Network addresses, like mailing addresses, must be unique. No two devices on the same network can have the same network address.

Networking Address Types

The following table compares two types of networking addresses: the physical address and the logical address. Table 1: Networking Address Types

TYPE DESCRIPTION

Physical address

The physical address of a device is also called the media access control (MAC) address. MAC addresses are burned into the read-only memory of every network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device's MAC address. An important feature of MAC addresses is that they are globally unique. No two network interfaces in the world have the same MAC address. An example of a MAC address is 00-09-5B-36-C2-93. The MAC address is sometimes shown as a group of four hex values (e.g.,0009.5B36.C293).

Note that the MAC addresses are in hexadecimal form. Therefore, a MAC address can consist only of the numbers 0-9 and the letters A-F. MAC addresses are a 48-bit binary number. However, you will always work with MAC addresses as a 12-character hex number. MAC addresses are typically composed of six groups of two hexadecimal digits separated by hyphens or colons. The first six characters of any MAC address are used to identify the manufacturer of the device; the last six identify the network interface. By using these two number sets, the manufacturer and the interface, no two network interfaces will ever have the same MAC address. Wireless networks are often configured to allow or reject client connections based on the hardware address. This is called MAC address filtering.


Logical address

Logical addresses are assigned by software and, as such, can be changed. They include two parts: the network address and the host address.

• The network address specifies the network segment (also called a subnet). All devices on the same network segment share the same logical network address.


• The logical host address identifies a specific host on the network. Each device must have a unique logical host address.


The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses. IP addresses combine the logical network and logical host addresses into a single address. An example IP address is: 192.168.1.1.


IP Addresses

In a small network with a few computers, a printer, and a server, each device would have its own IP address. The format for an IP address is four numbers between 0 and 255, separated by periods (e.g., 192.168.1.1). This is known as a dotted decimal notation. Each segment of the address is called an octet. This is because in binary, each section is represented by eight digits, from eight zeros all the way up to eight ones, which is the same as 255 in decimal.

In summary, an IP address:

• Is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period.


• Can be represented in one of two ways:


• o Decimal (e.g., 131.107.2.200). In decimal notation, each octet must be between 0 and 255.


o Binary (e.g., 10000011.01101011.00000010.11001000). In binary notation, each octet is an 8-digit number.


• Includes both the network address and the host address.


• Uses a subnet mask to differentiate the network and host addresses.

IP Address Classes

IP addresses use default classes that include a default subnet mask value. The class defines the default network address portion of the IP address.

Table 2: IP Address Classes Class

Address Range Subnet Mask


A

1.0.0.0 126.255.255.255

255.0.0.0


B

128.0.0.0 191.255.255.255

255.255.0.0


C

192.0.0.0 223.255.255.255

255.255.255.0


D

224.0.0.0 239.255.255.255

N/A


E

240.0.0.0 255.255.255.255

N/A


The IP address 192.168.6.11 is an example of a Class C address that uses a default mask of 255.255.255.0. With this address, the network address is 192.168.6.0, and the host address is 11. Be aware that the address range from

• 0.0.0.0 to 0.255.255.255 is reserved for broadcast messages to the current network.


• 127.0.0.0 to 127.255.255.255 is reserved for loopback addresses to the local host.


IP Version 6

The number format described above is called IP version 4. It works great, with one small problem: as more devices have connected to the internet, all available IP addresses have been used.

To solve this problem, the internet is transitioning into a new format called IP version 6. IPv6 addresses are expressed as 32-character hex numbers. IPv4 has about four billion potential addresses. IPv6 has trillions (340 undecillion, a number equal to 1 followed by 36 zeros).

6.2.7 Networking Devices and Interfaces (Lesson Video) Transcript:

In this video, we're going to look at a few basic networking devices and interfaces.

The first device we'll look at is called a modem, which is short for modulator/demodulator. Signals that arrive at your network from an Internet Service Provider, whether through fiber, cable, or phone line, can't be directly understood by your computer. Instead, the signal passes through a modem, which translates it into a series of electrical ones and zeros that travel through a copper wire to your computer. To upload data to the Internet, the modem does the opposite, turning ones and zeros into light, cable, or phone signals.

Next, let's look at a router. A router's job is to send signals from one network to another. When you send an email, the signal travels through a wire or radio signal to your network's router. The router sees that data is addressed to a different

network and forwards it on to the ISP. Then, a router at the ISP looks at the data, sees where it's supposed to go, and sends it to the router of the network where the recipient's mail server is stored.

Now let's look at a switch. Similar to the way a router transfers data between networks, switches transfer data between devices within a network. Every computer on the network is connected to the switch. Whenever a computer sends a signal, or when a signal comes in from the router, the switch looks at the data. If it recognizes the receiving computer as another device on the switch, it sends it directly to that computer. If it doesn't recognize the data, it sends it off to the router.

Another device you'll probably see is called a wireless access point. Conceptually, an access point works in a similar way to a switch – it recognizes which device should receive the signal, then forwards the data to where it needs to go. The main difference is that they use Wi-Fi technology to connect devices to the network wirelessly, as opposed to a switch which uses wires.

Last, let's look at a firewall. As amazing as the Internet is, it's full of malicious people and software that you want to keep away from your computer. A firewall checks each bit of data that tries to enter your network. If it decides it's safe, it passes it along. If it thinks it's dangerous, it rejects the data.

By this point, you may be wondering if you need to buy all this equipment to connect your home network to the Internet. The answer is yes, but actually no. For a small network like you'd typically install in a home, most people buy one of these. These are usually called wireless routers or Wi-Fi routers, but in reality they're a combination of all the previous devices in one. We just call them routers because saying "modem-router-switch-access point-firewalls" is a bit of a mouthful.

Let's end this video by talking about a few common plugs and interfaces you'll see in a typical network.

This is called a Registered Jack 11 interface, or RJ-11. It has four pins, and a clip to hold the plug into a wall socket. RJ- 11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack. A much more common interface is this one – RJ-45. These jacks have eight pins and are a little wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network.

Bluetooth is a technology used to create wireless connections between computers and devices. Bluetooth uses radio signals to connect devices at a short range – usually no more than ten meters.

Another technology to be aware of is Near Field Communications, or NFC. NFC uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. If you've ever held your smartphone near a scanner to pay for an item in a store, you've used NFC.

In this video, we learned about several networking devices. We talked about modems, routers, switches, wireless access points, and firewalls. We also discussed a few common interfaces – RJ-11, RJ-45, Bluetooth, and NFC.

6.2.8 Networking Device and Interface Facts

Many corporate networks employ the client-server model. In this model, there are two main types of hosts (computers) on the network: clients that consume network services, and servers that provide them.

Network services include email, file sharing, online gaming, Voice over IP, and printing. By consolidating all network services onto a server, clients can have equal, unrestricted access to the services.

This lesson covers the following topics:

• Server types


• Networking devices


• Networking interfaces


• Virtual LAN (VLAN)


Server Types

Although each server is different, most servers use many of the same components that a workstation or client computer uses. However, servers typically have more memory, disk space, and processing power than a workstation computer.

The table below describes a few basic kinds of servers. Keep in mind that each of these services can be run by the same physical hardware.

Table 1: Server Types Type

Description

File server

File servers provide network access to shared disk storage. They make it easier to share and


Mail server

Mail servers provide email service to a network. In many ways, they're like virtual p


Web

Every site you've visited on the World Wide Web, including this one, has been hosted on a web


Database

Database servers store databases, which are large repositories of organized data. Clients on the


Gaming server

Gaming servers keep track of events in multiplayer video games. Most online games have


Networking Devices

The table below describes some of the most common networking devices. Table 2: Networking Devices

Device Description


Modem

Modem is short for modulator/demodulator. Signals that arrive at your network from an Internet


Router

A router's job is to send signals from one network to another. When you send an email, the signal


Switch

Similar to the way a router transfers data between networks, switches transfer data between


Access point

Conceptually, an access point (AP) works in a similar way to a switch; it recognizes the device that


Firewall

As amazing as the internet is, it's full of malicious people and software that you want to keep away


Home

For a small network, such as a SOHO, most people buy a single router. These are usually called


Networking Interfaces

If a LAN services only a SOHO, it can use any of the above multifunction devices to connect to the internet and/or other computers in the LAN. This includes switches, routers, modems, and access points.

The table below describes some of the most common plugs and interfaces you'll see in a typical network. Table 3: Networking Interfaces

Interface Description


RJ-11

The Registered Jack 11 interface (RJ

RJ-45

The RJ


Bluetooth

Bluetooth is a technology used to create wireless connections between computers and


Radio Frequency ID

RFID, can be used for tracking objects. There are two types of RFID, passive (does


Near Field

NFC uses specially encoded tags that respond in a specific way when scanned by a


Virtual LAN (VLAN)

A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. Most screened segments, also known as demilitarized zones (DMZs), are created using a VLAN. You can configure multiple VLANs with varying security requirements on one switch. This keeps the cost down.

Although devices connect to the same switch, they cannot see other devices that are configured to a separate VLAN. All communication between separate VLANs must go through the router. When setting up VLANs, keep in mind:

• VLAN membership is configured by assigning a switch port to a VLAN.


• A switch can have multiple VLANs configured on it, but each switch port can be a member of only one VLAN. The one exception is described below.


• VLANs can be defined on a single switch or configured on multiple interconnected switches. When interconnecting switches, a high bandwidth backbone segment is used. The backbone segments are typically between the router and the internet, as well as between the switches themselves.


• With multiple switches, each switch can be configured with the same VLANs. The devices on one switch can communicate with devices on other switches if they are members of the same VLAN.


• A trunk port is used to connect two switches together.


• In a typical configuration with multiple VLANs, workstations in one VLAN cannot communicate with workstations in other VLANs.


• To enable inter-VLAN communication, use a router or an OSI Layer 3 switch.


• Using VLANs, you can create multiple IP broadcast domains on a switch. Each VLAN is in its own broadcast domain. Broadcast traffic is sent only to members of the same VLAN.


A screened subnet , (demilitarized zone) is a segmented network (or subnet) that sits between the private network and an untrusted network, such as the internet. Typically:

• Firewalls allow traffic that originates in the secured internal network into the screened subnet and through to the internet.


• Traffic that originates in the screened subnet (low-security area) or the internet (no-security area) should not be allowed access to the intranet (high-security area).

Because screened subnets can be challenging to access for management and administrative tasks, a server, or jumpbox, can be implemented to provide a tightly controlled access method, or jumping point, for administrators.

6.2.9 Network Servers (Lesson Video) Transcript:

A network is a group of computers connected together so they can communicate with each other. Each computer on the network is called a host. On most networks, there are two kinds of hosts: clients and servers. The difference is that clients, like the device you're using to watch this video right now, consume network services, and servers provide them. Let's look at an example.

This is a diagram of a simple office network with two computers – one for Ann and one for Bob. Right now, the network doesn't have a server. Instead, each computer is providing some of the network services. Ann's computer has a printer that's shared with Bob, and Bob's computer has a huge storage drive that he shares with Ann. However, this setup has some problems. For example, if Bob is out of the office and has turned his computer off, Ann won't be able to access her files saved on his hard drive. Likewise, if Ann's computer is turned off, Bob won't be able to use the printer.

The way to solve these problems is to introduce a special computer to the network called a server. Unlike these two clients, servers aren't used to do ordinary work, like word processing or creating spreadsheets. Instead, servers provide network services to the clients on the network. Now, instead of storing files on Bob's computer, Ann and Bob can both can store them on the server. They can also use the server to manage the printer. Even if their computers are turned off, they'll still have access to the network services on the server. This kind of architecture is called the client-server model. Servers provide network services, and clients consume them.

There are many other services that servers can provide. Mail servers store and deliver email messages, web servers provide access to websites, and database servers store databases.

We've just seen how servers work in a client/server network architecture. We've also looked at a few of services servers can provide, including printing, file storage, email management, website access, and databases.

6.2.10 Install a Network Adapter (Demo Video) Transcript:

In this lab, you need to add a network interface card to a desktop computer. To start, switch to the motherboard view. Open the Network Adapters on the shelf and drag this 1000BaseTX adaptor to this PCI express slot.

Next, we need to connect our new NIC to our Ethernet network. Switch to the back view of the computer. Select the Cat6 cable from the shelf. Drag one end of the cable to the RJ-45 port on the NIC, and the other end to the port on the wall plate.

Now we can power on the computer and check to see if we have a network connection. Switch to the front view of the computer and press the power button. If we right-click the network icon and select Open Network & Internet settings, the status window shows an active connection to the network and the Internet.

6.2.11 Install a Network Adapter (Simulation) Scenario

You are the IT administrator for a small corporate network. To accommodate specific network communication needs for an upcoming project, you need to upgrade the network connection's speed for the workstation in the Support Office.

In this lab, your task is to complete the following on the Support workstation:

• Select and install the 1000BaseTX PCIe network interface card, which has with the fastest speed to connect to the local network.


• Select and install the Cat6a cable to connect the computer to the local area network.


• In Network & Internet settings, confirm that the workstation is connected to the local network and the internet.


Explanation

In this lab, your task is to complete the following on the Support workstation:

• Select and install the 1000BaseTX PCIe network interface card, which has with the fastest speed to connect to the local network.


• Select and install the Cat6a cable to connect the computer to the local area network.


• In Network & Internet settings, confirm that the workstation is connected to the local network and the internet.

Complete this lab as follows:

1. Above the computer, select Motherboard to switch to the motherboard view of the computer.


2. On the Shelf, expand Network Adapters .


3. Drag the 1000BaseTX network adapter to a free PCIe slot on the computer. PCIe slot on Motherboard


4. Connect the computer to the network as follows: a. Above the computer, select Back to switch to the back view of the computer.


b. On the Shelf, expand Cables .


c. Select the Cat6a Cable .


d. In the Selected Component window, drag a connector to the NIC port on the 1000BaseTX network adapter.


e. In the Selected Component window, drag the other connector to the Ethernet port on the wall outlet.


5. Confirm that the computer is connected to the local network and the internet as follows: a. Above the computer, select Front to switch to the front view of the computer.


b. Click the power button on the computer case to turn the computer on.


c. After the operating system loads, right-click the Network icon and select Open Network & Internet settings . The Status window shows an active connection to the network and the internet.


Admin Use Only: PC626B

6.2.12 Section Quiz (Section Quiz) q_itf_networking_adapter

Which of the following network components provides a port for a computer to connect to a wired network? Answers:

• *Network interface (adapter)


• Wall jack


• Network router


• Network switch


Explanation:

A network interface, or adapter, must be installed on each computer for them to connect to the network media. The network interface provides the applicable port into which a network cable can be connected.

A wall jack provides a way to connect a cable running from your computer adapter to a wired network. In other words, the port is in the wall jack and not in the computer.

A network router sends signals from one network to another. While they do connect to the network, they are not designed provide a network interface from inside a computer.

A network switch transfers data between devices within a network. Switches do provide a network interface from inside a computer.

q_itf_networking_basic_facts_01

Which of the following components is NOT required to create a network? Answers:

• *Wireless adapter


• Computer systems


• Network media


• Network interfaces


Explanation:

Networks are made of computer systems, network media, and network interfaces. Wireless adapters may be used in a network but are not necessary.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.5. q_itf_networking_basic_facts_02

Multiple computers configured to be able to communicate and share information with each other form a         . Answers:

• *Network


• Commune


• Family


• Group


Explanation:

Whenever two or more computers are configured to share information with each other, they're called a network. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.5. q_itf_networking_basic_facts_03

Which of the following is the best definition for a LAN? Answers:

• *A network in a small geographic area, like in an office.


• A network whose computers and servers are separated geographically but still connected.


• The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less).


• An extension of a private network over a shared or public network, such as the Internet.


Explanation:

A LAN is a network in a small geographic area, like in an office.

A WAN is a network whose computers and servers are geographically far apart but still connected. A PAN (personal

area network) is the interconnection of components, such as laptops, mobile devices, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters or less). A VPN is the extension of a private network over a shared or public network, such as the Internet. q_itf_networking_basic_facts_04

Which of the following connectors are used to terminate a Cat 5e and Cat 6a network cable? Answers:

• *RJ-45


• RJ-11


• LC


• BNC


Explanation:

The RJ-45 connector is used to terminate copper network cabling. The RJ-11 connector is used to terminate a Cat 3 telephone line. LC is a fiber optic cable connector.

BNC is a coax cable connector. q_itf_networking_client

A computer system can be interconnected to other computer systems for the purpose of sharing information with each other. What are these computer systems called?

Answers:

• *Network clients


• Network servers


• Network interfaces


• Local area networks (LANs)


Explanation:

A network is a group of computer systems that are interconnected in such a manner that they can share information with each other. These computers are sometimes called a host, a client, or a node.

A network server provides services and resources that can be requested by users from a network client. However, a network server is not a network client.

A network interface provides a port into which a network cable can be connected, allowing a computer to connect to the network. However, the computer system (not the port) is a network client.

A local area network (LAN) is a group of connected computers that are physically close together, usually in the same building. However, a LAN is a network topology and not a computer system.

q_itf_networking_media

Before two computers can communicate over a network, some type of network media must be used to connect the computers together. Which of the following are examples of network media? (Select three.)

Answers:

• Network interface (adapter)


• *Copper wiring


• Network protocols


• *Fiber optics

• Near Field Communications (NFC)


• Local Area Network (LAN)


• *Radio signals


Explanation:

Copper wiring is an example of network media used to connect computers together. Fiber optics is an example of network media used to connect computers together.

A radio signal is an example of network media used to connect computers together.

A network interface (adapter) provides the receptacle (port) for connecting computers together, but it is not the network media that actually does the connecting.

Network protocols are rules that assist with the transfer of data between computers, but they are not the network media that actually does the connecting.

Near Field Communications (NFC) is a technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store. However, it is not designed to connect computers together.

A Local Area Network (LAN) is a network topology used for a group of networked computers that are physically close together, usually in the same building. However, it is not designed to connect computers together. q_itf_networking_wifi

Justin has purchased a new laptop but is having problems connecting to his home Wi-Fi network. Which of the following is the MOST likely issue that is preventing the laptop from connecting to the Wi-Fi network?

Answers:

• A wireless network interface needs to be installed on the laptop.


• An RJ-45 cable needs to be run from the laptop to the wireless router.


• *The external Wi-Fi button or switch on the laptop case needs to be turned on.


• The laptop operating system software needs to be updated.


Explanation:

Most notebook and laptop systems provide an external button or switch on the computer case that enables or disables the wireless network interface. Justin probably needs to turn the button or switch to the ON position.

Most notebook and laptop systems provide an integrated wireless network interface, so you do not need to install one. While running a cable from the laptop to the Ethernet (RJ-45) port on the wireless router will give Justin access to the internet, it does not solve the issue of connecting wirelessly to the home Wi-Fi network.

While updating the operating system software is a critical step in using a new laptop, it may or may not impact the wireless network interface's functionality.

q_itf_networking_wired

Which of the following are wired components that allow a computer to connect to an internal company network? (Select two.)

Answers:

• RJ-11 cable


• *RJ-45 cable


• *Network interface port


• Router


• Switch

Explanation:

An RJ-45 network cable connects a computer to a wired network.

A network interface provides an RJ-45 or fiber port into which a network cable (such as an RJ-45 cable) can be connected.

An RJ-11 cable is used to connect to a telephone line. In a DSL network, this interface connects the modem to the wall jack.

A router is a network device that moves traffic between two networks, but it does not provide hardware for connecting a computer to a network.

A switch is a network device that moves traffic within an IP network, but it does not provide hardware for connecting a computer to a network.

q_itf2_networktypes_lan

A network engineer has set up a network at company headquarters to service all employees. Which of the following BEST describes this type of network topology?

Answers:

• MAN


• WAN


• *LAN


• Private


Explanation:

A local area network (LAN) is a network of connected devices localized in a single physical location, such as in a single office building (company headquarters).

A metropolitan area network (MAN) is a kind of network that covers a larger geographical area than a LAN but is not usually as large as a WAN. It is commonly used with smaller networks connected through a city into one larger, centralized network.

A wide area network (WAN) connects multiple LANs to create a much larger network. For example, if you have a company that has a headquarters and branch offices spread across different cities, each branch will have its own LAN, and all these company LANs will be connected into the larger WAN.

A private network refers to a network that can only be accessed by computers inside the network. It is not a network topology.

q_itf_address_decimal

An IP address is represented by four numbers between 0 and 255 separated by periods. What is another name for this type of representation?

Answers:

• MAC address


• Subnet mask


• *Dotted decimal notation


• VPN server address


Explanation:

The format for an IP address is four numbers between 0 and 255 separated by periods. This is known as dotted decimal notation.

A media access control (MAC) address is a device's unique physical address. It uses hexadecimal notation instead of decimal notation.

A subnet mask value divides an IP address into the host address and the network address. It is not a type of decimal

notation.

A VPN (virtual private network) server provides privacy by creating a private network from a public internet connection. The VPN server address is the IP address assigned to the VPN server, but it is not a type of decimal notation. q_itf_address_device_facts_01

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.

Which of the following features lets you allow or reject client connections based on the hardware address? Answers:

• WEP


• DHCP


• *MAC address filtering


• SSID


Explanation:

MAC address filtering allows or rejects client connections based on the hardware address. Wi-Fi Protected Access II (WPA2) provides encryption and user authentication for wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA2 is considered more secure than WEP. The SSID is the network name or identifier. q_itf_address_device_facts_02

A new server has been installed and requires a static IP address. Which of the following would be a valid IP address? Answers:

• *172.84.0.211


• 127.0.0.1


• 255.255.255.0


• 10.88.257.0


Explanation:

172.84.0.211 is a valid class B IP address.

127.0.0.1 is the loopback address for a network adapter and is not a valid IP address for a server.

255.255.255.0 and 10.88.257.0 each represent a network segment and do not function as a valid IP address for a server. q_itf_address_ip

In a networking environment, which of the following describes a 32-bit binary number in four octets with each octet separated by a period?

Answers:

• MAC address


• *IP address


• Memory address


• Network address


Explanation:

An IP (Internet Protocol) address is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period.

A MAC (media access control) address is a device's physical address. It is burned into the read-only memory of every single network interface. An example MAC address is 00-09-5B-36-C2-93; it is not a 32-bit binary number in four octets.

A memory address is a location in memory that's used by software and hardware for storage or processing. It is not an address used for networking.

A network address is part of an IP address that identifies a network. However, it is only two octets, not four. q_itf_address_mac

Which of the following BEST describes a media access control (MAC) address? Answers:

• Logical address


• Subnet mask


• *Physical address


• Domain Name System (DNS)


Explanation:

A device's physical address is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards.

Logical addresses are assigned by software and include two parts - the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses. Logical addresses can change, while physical addresses are permanent.

A subnet mask value divides an IP address into the host address and the network address. It is not a type of physical address.

Domain Name System (DNS) is a protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses. It is not associated with physical addresses. q_itf_netdevices_firewall_01

Which of the following statements BEST describes a firewall? Answers:

• A firewall is a peripheral device attached to your computer that restricts the flow of data between the computer and a network.


• A firewall blocks all traffic between computers and networks.


• *A firewall restricts the flow of data between hosts and networks by checking data packets to make sure they are safe.


• A firewall filters data packets between a computer and the internet.


Explanation:

A firewall restricts how hosts and network applications are accessible to each other by checking each bit of data (called a packet) that tries to enter your network to make sure that it is safe.

A firewall is software. It is not an attached peripheral device.

A firewall is not designed to block all data traffic (although it can). It is designed to filter packets of information flowing between computers and networks to make sure they are safe.

A firewall can filter data packets flowing between a computer and the internet, but it is also designed to filter all data traffic flowing to and from a computer from any network.

q_itf_netdevices_firewall_02

April wants to protect her Small Office Home Office (SOHO) network from malicious data that could enter her network and impact her business. Which of the following provides the BEST solution for protecting her computer from malicious

data?

Answers:

• *Firewall


• Switch


• File server


• Modem


Explanation:

A firewall checks each bit of data (called a packet) that tries to enter your network. If it decides a packet is safe, it passes it along to your computer. Otherwise, it drops or rejects the packet.

A switch is designed to transfer data between devices within a SOHO network. It is not designed to check each packet of data entering the network to decide if it is safe.

A file server provides network access for shared disk storage and is not designed to check each packet of data entering the network to decide if it is safe.

A modem translates signals that arrive from your internet service provider (ISP) into 1s and 0s that can be processed by your computer. A modem is not designed to check each packet of data entering the network to decide if it is safe. q_itf_netdevices_interface_facts_01

Assigning a unique letter (such as N:) to a shared drive is called         the drive. Answers:

• *Mapping


• Lettering


• Saving


• Attaching


Explanation:

Mapping a drive makes it much easier to access its files from your computer. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.3. q_itf_netdevices_interface_facts_02

Which of the following provides services to hosts on its network? Answers:

• *Server


• Client


• Storage


• Email


Explanation:

Servers are computers that provide network services to other hosts on a network.

Clients are computers that consume network services provided by servers. The computer you're using right now is a client.

Storage and email are both services that can be provided to clients by servers. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.5. q_itf_netdevices_interface_facts_03

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.

Which of the following is the technology being used in these phones? Answers:

• *NFC chips


• Bluetooth transmitters


• Infrared transmitters


• VPN


Explanation:

Near field communications (NFC) chips are a wireless mobile technology that can be embedded in credit cards and smartphones for transmitting financial information when making payments. For example, many point of sale devices can read information from NFC chips. NFC chips can also be used in passports to contain identity information. q_itf_netdevices_interface_facts_04

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Answers:

• *Ethernet


• Token Ring


• Bluetooth


• 802.11n


• ArcNet


Explanation:

Ethernet is a wired, local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports.

Bluetooth is a wireless standard that allows the creation of short-range Personal Area Networks (PANs). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN. 802.11n is a wireless standard used in local area networks.

q_itf_netdevices_interface_facts_05

Which of the following wireless communication technologies can be described as follows?

• Has a very limited transmission range, of less than two inches


• Used with credit cards and passports


• Slower than other wireless technologies


• Constantly emitting a signal


Answers:

• *NFC

• Bluetooth


• IEEE 1394


• Infrared in diffuse mode


• Infrared in line-of-sight mode


Explanation:

Near Field Communication, or NFC, uses the 13.56 MHz frequency and has a very short range. In order for devices to communicate, they have to be within two inches of each other. NFC chips are being used for such applications as passports and credit cards to contain all the information about the passport holder or the credit card account. NFC chips use encryption algorithms to secure the connection but are constantly emitting a signal and use a much slower transmission speed than other wireless technologies.

q_itf_netdevices_interface_facts_06

Which kind of connector do you use to connect a modem to a standard telephone line? Answers:

• *RJ-11


• RJ-45


• RG-58


• F-type


Explanation:

A standard telephone line connector is an RJ-11. RJ-45 jacks are used for Ethernet twisted pair cables. Video cards and monitors with a built-in TV tuner have an F-type video connector. RG-58 is used for 10Base2 Ethernet networking (also called Thinnet).

q_itf_netdevices_interface_facts_07

Which connector is used with an unshielded twisted pair (UTP) cable? Answers:

• *RJ-45


• BNC


• AUI


• DIX


Explanation:

An RJ-45 connector is used with an unshielded twisted pair (UTP) cable. BNC and AUI are used with coaxial cables. DIX is an Ethernet protocol. q_itf_netdevices_interface_facts_08

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.

Which of the following network devices would be the BEST choice for this connectivity? Answers:

• *Access point


• Firewall

• Switch


• Router


Explanation:

An access point gives WiFi access to a network.

A firewall filters network traffic based on a set of rules.

A switch maintains a table of MAC addresses by port and forwards network frames only to the port that matches the MAC address.

A router manages IP traffic between networks. q_itf_netdevices_interface_facts_09

Which of the following is the best device to deploy to protect your private network from an untrusted public network? Answers:

• *Firewall


• Router


• Hub


• Gateway


Explanation:

A firewall is the best device to deploy to protect your private network from an untrusted public network. Firewalls are used to control traffic entering and leaving your trusted network environment. Firewalls can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content. Routers offer some packet-based access control but not as extensive as that of a full-fledged firewall. Hubs and gateways are not sufficient for managing the interface between a trusted and an untrusted network. q_itf_netdevices_interface_facts_10

A technician is installing a cable modem that supplies internet connectivity for a home office.

Which of the following cabling types would be used to connect the cable modem to the cable wall outlet? Answers:

• *RG6


• CAT 5e


• Multimode fiber


• CAT 6a


Explanation:

Cable modems are connected to a cable wall outlet using coaxial cabling. RG6 is the most common coaxial cable used for this connection.

CAT 5e, CAT 6a, and multimode fiber cables can't be used to connect cable modems to a cable wall outlet. q_itf_netdevices_interface_facts_11

Which of the following is a firewall function? Answers:

• *Packet filtering


• FTP hosting


• Encrypting

• Packet rearranging


• Protocol converting


Explanation:

Firewalls often filter packets by checking each packet against a set of administrator-defined criteria. If the packet is not accepted, it is simply dropped.

q_itf_netdevices_interface_facts_12

Rick and Steve want to share information between their smart phones without connecting to the WiFi network. Which of the following is the least complicated way to accomplish this?

Answers:

• *Bluetooth


• NFC


• Infrared


• USB cable


Explanation:

Enabling Bluetooth and sharing information on a smartphone is very quick and easy. NFC is typically used for payment transactions using a smart phone.

Infrared is not typically available on smart phones.

A USB cable would be problematic based on the phone manufacture and software available to enable a peer-to-peer network.

q_itf_netdevices_interface_facts_13

Which of the following wireless technologies requires a distance of approximately 4 cm (1.5 inches) in order to establish a communications link between devices?

Answers:

• *NFC


• Bluetooth


• WiFi


• Infrared


Explanation:

Near Field Communications, or NFC, uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC requires the devices to be approximately 4 cm or 1.5 inches from each other.

Bluetooth can work approximately 30 feet away.

WiFi, depending on the device, can maintain a connection over much greater distances. Infrared can transmit over greater distances such as for TV remotes or printers within a room. q_itf_netdevices_interface_facts_14

Brandon, a technician, has recently noticed that the wireless network in the office has slowed down. What could he do to support faster connections?

Answers:

• *Reduce any possible EMI


• Upgrade to 802.11g

• Change the default password


• Enable Wi-Fi Protected Access


Explanation:

When a Wi-Fi device encounters electromagnetic interference (EMI) from microwave ovens, fluorescent lights, cordless phones, and other sources, it may slow its transmission rates to an intolerable level. EMI can be reduced by bring your device closer to the wireless router and avoid using the device near possible sources of EMI.

Upgrading your wireless network to 802.11g will generally not increase connection speeds on a network that has recently slowed down.

Changing the default Wi-Fi password and enabling Wi-Fi security are good ideas, but they will not increase connection speeds.

q_itf_netdevices_interface_facts_15

A small business has doubled in size over the past year. The IT consultant for the company is recommending the addition of a computing device that will provide central access to business resources. Which of the following describes the type of device needed?

Answers:

• *Network Server


• Business-class workstations


• Tablets for each employee


• Laptops for each employee


Explanation:

A network server is a host or computer on the network that provides services to clients or workstations. Business-class workstations are clients that connect to network servers.

Tablets and laptops would provide a distributed client and not central access to business resources. q_itf_netdevices_interface_facts_16

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Answers:

• *Modem


• Router


• Switch


• Server


Explanation:

Cable internet providers require the client to have a modem to receive the signal from a coax cable and convert the signal for use with a data network, typically over copper Ethernet cables.

A router is a network device that moves traffic between two different IP networks. A switch is a network device that moves traffic within an IP network.

A server is a computer that provides services to clients on a network. q_itf_netdevices_modem

Which of the following BEST describes the Small Office Home Office (SOHO) hardware component that translates an internet service provider's (ISP) signals into 1s and 0s that can be used by a computer?

Answers:

• Switch


• Firewall


• *Modem


• Router


Explanation:

A modem translates the signals from an ISP into a series of electrical 1s and 0s that travel through a copper wire to your computer. To upload data to the internet, the modem does the opposite, turning 1s and 0s into light, cable, or phone signals.

A switch transfers data between devices within a network. Switches do not translate ISP signals into 1s and 0s.

A firewall checks each bit of data (called a packet) that enters your network to make sure it is safe. Firewalls do not translate ISP signals into 1s and 0s.

A router sends signals from one network to another. Routers do not translate ISP signals into 1s and 0s. q_itf_netdevices_nfc

Which of the following would MOST likely be used for contactless payment? Answers:

• RFID


• *NFC


• Wi-Fi


• Bluetooth


Explanation:

NFC (Near Field Communication) is a peer-to-peer version of RFID that's used to transfer data across a very small distance (typically about 2 inches). NFC is often used with smartphones for contactless payment, security ID badges, or in labels for inventory tracking.

RFID (Radio Frequency ID) is used to tag and track items. It would not be used for contactless payment. Wi-Fi provides wireless access to a network. It would not be used for contactless payment.

Bluetooth is a technology used to create wireless connections between computers and devices. It would not be used for contactless payment.

q_itf_netdevices_rj45

Which of the following networking interfaces connects a computer to a wired local area network (LAN)? Answers:

• *RJ-45


• RJ-11


• RFID


• NFC


Explanation:

The RJ-45 networking interface is common in today's networks and creates a wired connection between a computer and a network.

The RJ-11 networking interface is used to connect to a telephone line and is often used in a DSL network (not a LAN

network) to connect a modem to a wall jack.

RFID (Radio Frequency ID) uses tags to help track objects such as clothing or individuals. It is not a LAN networking interface.

NFC (Near Field Communication) uses specially encoded tags that respond in a specific way when scanned by a reader, such as holding your smartphone near a scanner to pay for an item. NFC is a subset of RFID and is not a LAN networking interface.

q_itf_netdevices_switch_01

What is the basic difference between a switch and a router in a Small Office Home Office (SOHO) network? Answers:

• A switch sends data to another network; a router sends data to a device on the network.


• A switch forwards data to an ISP router; a router checks each bit of data to make sure it is safe.


• A switch translates data into a series of 1s and 0s; a router sends data to a device on the network.


• *A switch sends data to a device on the network; a router sends data to another network.


Explanation:

A switch is designed to transfer data between devices within a SOHO network, while a router sends data to a different network (such as the ISP).

A switch sends data to devices on a SOHO network (not a router), while the router is responsible for sending data to a different network (such as the ISP).

A router is responsible for sending data to a different network (such as the ISP), while a firewall is designed to check each bit of data to make sure it is safe.

A modem translates data into a series of 1s and 0s that the computer can process, while a switch sends data to a device on the SOHO network.

q_itf_netdevices_switch_02

Which of the following provides the same functionality as an access point (AP) but is designed to work on a wired SOHO network instead of over Wi-Fi?

Answers:

• Router


• *Switch


• Modem


• Firewall


Explanation:

An access point (AP) works in a similar way to a switch, recognizing which device should receive the signal, and then forwarding the data to where it needs to go. The main difference is that an access point uses Wi-Fi technology to connect devices to a network wirelessly, as opposed to a switch, which uses wires.

An access point (AP) is designed to transfer data between devices within a network, while a router sends data to a different network (such as the ISP).

An access point (AP) is designed to transfer data between devices within a network, while a modem is designed to translate a signal from an ISP into 1s and 0s that can be processed by a computer.

An access point (AP) is designed to transfer data between devices within a network, while a firewall is designed to check each bit of data to make sure it is safe.

q_itf_netdevices_switch_03

What are the advantages of a switch on an enterprise network over a switch on a SOHO (Small Office Home Office) network? (Select two.)

Answers:

• *A switch on an enterprise network can provide 20 or more ports.


• A switch on an enterprise network can both transfer data between networks and transfer data between devices on the network.


• A switch on an enterprise network can process data into 1s and 0s faster.


• *A switch on an enterprise network can be interconnected to other switches to support hundreds of connections.


• A switch on an enterprise network provides safer filtering of malicious data entering the network.


Explanation:

A switch on a Small Office Home Office (SOHO) usually has anywhere from 4 to 8 RJ-45 ports, while a switch on an enterprise environment can have 20 or more.

Switches on enterprise environments can be interconnected, providing support for hundreds of connections.

A switch (whether for SOHO or an enterprise) is only designed to transfer data between devices within the network. A router performs the task of transferring data between networks.

A switch (whether for SOHO or an enterprise) is only designed to transfer data between devices within the network. A modem performs the task of processing data from an ISP signal into 1s and 0s.

A switch (whether for SOHO or an enterprise) is only designed to transfer data between devices within the network. A firewall performs the task of filtering unsafe data from a malicious source.

6.3 Wired and Wireless Networking Section Introduction

As you study this section, keep the following questions in mind:

• What are the advantages of a wired network connection? What are the advantages of a wireless connection?


• How are Wi-Fi and Bluetooth similar? How are they different?


After finishing this section, you should be able to:

• Describe the most common networking cable types, including twisted pair, coaxial, and fiber optic cables.


• Use an Ethernet cable to connect a workstation to a local area network.


• Compare and contrast wireless networking standards, including IEEE 802.11 (Wi-Fi) and Bluetooth.


• Connect to a public Wi-Fi network.


• Connect to a secure wireless network.


• Describe best practices in installing and configuring a wireless network.


• Describe the most common ways to set up printing over a network.


• Install a wireless access point, including the appropriate cable connections.


• Configure a laptop to connect to a wireless network.


• Share a printer with other users on a local network.


• Add a shared printer to the list of available printers on another workstation.


• Pair Bluetooth speakers with a mobile device. o Discover available Bluetooth devices.

o Connect a mobile device to Bluetooth speakers.


Key terms for this section include the following:

Term Definition


Network Cable

A cable that provides connectivity between network devices. A common network cable connects a computer's network interface with a wall jack.


Coaxial Cable

A cable that provides transmission on a network through its inner wire in the form of electrical signals. The wire is made up of four different components: an inner conductor, an insulator made of flexible PVC, a metallic shield, and a plastic jacket coating.


Twisted Pair Cable

A cable that transmits data through electrical signals and provides better signals because of its eight unique plastic- coated copper wires that are twisted into four pairs.


Electromagnetic Interference

When an electrical current passes through any kind of copper wire, that creates an electromagnetic field just outside the wire.


Twisted Pair Category

The different types of twisted pair cabling that are defined by the several aspects of a cabl,e including its transmission specifications and intended use. Common categories include Cat 5e and Cat 6.


Fiber Optic Cable

A cable that uses light pulses to transmit data instead of electrical signals.


Registered Jack 11 (RJ-11) Interface

A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.


Registered Jack 45 (RJ-45) Interface

A network interface or connection with eight pins that is similar to an RJ-11 connector, but wider. RJ-45 is used to create a wired connection between a computer and a network.


Ethernet

Any wired network that conforms to the 802.3 protocols developed and maintained by the IEEE.


Router

A network device that moves traffic between two different IP networks.


Switch

A network device that moves traffic within an IP network.

IEEE 802 Standards

A family of standards that mostly dictate with how data is transferred between hosts in a local area network (LAN).


IEEE 802.11 Standards

A family of standards under the 802 standards that dictate how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.


IEEE 802.11 Encryption Protocols

Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.


Frequency

A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.


Attenuation

A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.


Interference

Dense material (such as steel) or electronic devices (such as cordless phones) that reduce or block Wi-Fi signals.


Speed

A characteristic of 802.11 protocols that requires them to transfer data at a specific number of bits per second.


Bluetooth

A technology used to create wireless connections between computers and devices.


Wi-Fi

A technology that uses radio signals to connect a device to an access point.


6.3.1 Network Cables (Lesson Video) Transcript:

The network medium is the physical channel that data communications travel through. Network media can be divided into two categories, bound and unbound.

With unbound media, the communications are not physically contained. Unbound media includes radio waves and light waves. Bound media means the communications are physically contained within some sort of cable.

In this lesson, we're going to look at some common types of bound media.

First, let's talk about coaxial cabling. Coaxial cables are made up of four different components. At the center is the inner conductor, typically made of a solid wire coated in copper or silver. Transmissions on a network travel along this inner wire in the form of electrical signals.

To protect the transmissions and prevent grounding, the wire is surrounded by an insulator made of flexible PVC. Around the insulator is some sort of metallic shield, typically aluminum mesh, which is used for grounding. To complete the cable, the entire assembly is coated with a plastic jacket.

The most common coaxial connector is the F-type connector, which has a swiveling head that screws onto its port. The benefit to using coaxial cabling is that it's relatively resistant to both electromagnetic interference and physical damage. However, it's more expensive than other types of networking media, especially when run over long distances. The next type of cable we'll talk about is called twisted pair cabling, which is easily the most prolific network medium.

Standard twisted pair cabling is composed of eight plastic-coated copper wires that are twisted into four pairs. The wires are twisted into pairs for a specific reason. When an electrical current passes through any kind of copper wire it creates an electromagnetic field just outside the wire. This is called electromagnetic interference, or EMI. EMI emitted by one wire can be absorbed by a neighboring wire, resulting in a shadow signal that affects communication. This effect is

known as cross talk.

However, by twisting two cables together, the electromagnetic fields generated by each wire cancel each other out, which greatly reduces cross talk. The tighter the wire pairs are twisted, the more EMI is reduced.

EMI can come from a lot of different sources, not just the cable's wires. For example, a wire may pick up EMI if it runs near a light fixture. Because of this, twisted pair cables come in two different types - UTP and STP.

UTP stands for unshielded twisted pair. The internal wires are encased in only a plastic sheath. UTP cabling is cheap but does not protect against external EMI at all.

STP stands for shielded twisted pair. STP cabling has additional shielding around the wire bundle to protect against EMI. Some STP cabling encases each wire pair in foil shielding to further protect against EMI. STP cabling is much more expensive than UTP cabling but is necessary in some situations.

There are different types of twisted pair cabling called categories. A category defines several aspects of the cable, including its transmission specifications and intended use.

If you were to simply look at a twisted pair cable, it would be hard to identify its category because they all look the same. However, almost all twisted pair cabling prints the category on the outer sheath of the cable. The word Cat, short for category, is followed by a number. Twisted pair cabling categories range from three up to eight, with variations in between.

The most common categories of twisted pair are Cat 5e, which stands for enhanced, and Cat 6. Cat 5e supports speeds of up to one gigabit per second. It's able to do this because the wires are twisted much tighter than lower category cables, which reduces cross-talk. Cat 6 cables support transfer speeds up to 10 gigabits per second and are typically used in

high-speed network and broadband infrastructures.

Twisted pair cables typically use RJ45 connectors. The RJ stands for "registered jack". RJ45 connectors have eight pins that connect to the four wire pairs in a cable. Another, less common, connector used with twisted pair cabling is the RJ11 connector.

With only four pins, this connector looks like a miniature RJ45 connector. RJ11 connectors are typically used with Cat 1 twisted pair cabling, which is the cabling used for telephone communications.

There's a reason twisted pair cabling is the most common medium for networks - UTP cables are very cheap. UTP Cat 5e cables can cost as little as 3 cents per foot. Twisted pair cabling is also flexible, making it easy to work with.

However, twisted pair cabling sometimes isn't the best choice. As we've discussed, twisted pair cables are susceptible to EMI, which can be generated by fluorescent lights, power lines, industrial equipment, and elevators. Even when using STP twisted pair cables, interference can be an issue.

Another weakness with twisted pair cable has to do with security. Remember, twisted pair cables emit a small amount of EMI. This EMI can be picked up by special devices and used to eavesdrop on communications.

The last bound medium we'll look at is fiber optic. Fiber optic cabling is quite a bit different from coaxial or twisted pair. Instead of using electrical signals to transmit data, fiber optic cabling uses light pulses.

Fiber optic cables have a central core that's made of either clear plastic or glass, which carries light pulses along the wire. Surrounding the central core is a layer of reflective cladding. As light travels down the central core, some of it tries to leak out. The cladding reflects the stray light pulses and redirects them back towards the center of the core.

Around the cladding are usually one or two protective layers that help prevent the central core from getting broken or damaged. Everything is then surrounded by a plastic sheath.

Fiber optic cabling comes in two different types. The first type is known as single-mode fiber. Single-mode fiber cables transfer data using a single light ray. The internal core in these types of cables is very small, about 10 microns in diameter. To put that in perspective, a human hair is about 50 microns. This small core prevents the light from bouncing around too much, which allows for very long cable lengths and high data transfer rates.

The second type is known as multi-mode fiber. Multi-mode fiber cables have a larger internal core, about 50 to 100 microns. This larger core allows multiple rays of light to be sent along the cable at the same time. However, this also allows gives the light more space to bounce around, which diffuses the light and reduces the maximum length of the cables.

Fiber optic cabling has several benefits over the other network media we've talked about. First, it's extremely fast – much faster than coaxial or twisted pair. Fiber optic cabling is also immune to EMI. Because the transmission medium is light, interference from external sources doesn't affect the communications at all and eavesdropping is impossible. Fiber optic cabling also has the longest transmission distances compared to other bound network media.

The biggest downside is that fiber optic cabling is very expensive compared to other types of network media. It also isn't as flexible as twisted pair or coaxial cables. If a fiber optic cable is bent too much, the internal core can break. In addition, the connectors on fiber optic cabling can only be installed by technicians who have special equipment and

training.

In this video, we discussed three types of bound networking media: Coaxial, twisted pair, and fiber optic.

6.3.2 Ethernet (Lesson Video) Transcript:

The Institute of Electrical and Electronics Engineers, or IEEE, is a professional association that develops and maintains networking standards and protocols. Their 802 family of protocols deals mostly with local area networks, and the rules for wired networks are found in section 3. Any wired network that conforms to the 802.3 protocols is called an Ethernet network.

In this video, we'll briefly discuss the components of an Ethernet network.

Each host on an Ethernet network, each computer and server, needs to have a network interface card or NIC installed. This is where the network cable gets plugged in.

Network interface cards have a few key components that are used for Ethernet network communication. A NIC's transceiver is responsible for converting digital data, that is zeroes and ones, into signals that are sent along the network medium. Each NIC also has a unique MAC address that's used for identification and communication purposes.

The connecting medium in an Ethernet network is typically unshielded twisted pair copper cabling - usually a Cat 5e or Cat 6 grade twisted pair cable. Some networks use fiber optic cabling as the connecting medium. Whichever one is used, it needs to be the same for the whole network – Ethernet doesn't allow some hosts to use fiber and others to use twisted pair.

Ethernet networks use a star network topology. This means that hosts in the network connect to a central connection point, typically a switch. The switch must use the same connection medium as the hosts.

Some Ethernet switches are able to provide what's called power over Ethernet (PoE). Switches with PoE provide a small amount of power through the Ethernet cabling. That power can be used to power small devices such as IP phones and security cameras without the need of a power outlet. PoE can be provided using only a twisted pair cable. Since fiber optic cabling sends signals with light instead of electricity, it can't provide power to devices.

Connected to the switch is the router, which forwards packets from within the network out to external networks, such as the internet. The router is also responsible for filtering incoming packets to the appropriate subnet.

In this video, we looked at the components that make up a typical Ethernet network: hosts with network interface cards, connecting media, a switch, and a router.

6.3.3 Set Up an Ethernet Connection (Demo Video) Transcript:

In this scenario, you need to connect a computer in an office to the company's network, which is connected to the Internet. First, go to office 1 by clicking the hardware button here. Next, switch to the back view of the computer tower. To connect this computer to the network, we need to use a network cable. Open the cables menu and click the Cat6a cable. Down here, we can see the two ends of the cable. Throughout this lab, you can zoom in and out by using the scroll wheel on the mouse. First, we'll connect one end of this cable to this port in the wall plate. Then, we'll drag the other end of the cable to this port on the back of the computer.

Now that the connection has been made, we need to verify that we have a network connection. Click the monitor to switch to Windows view. If we click the network icon, it tells us we're connected to the company's network. However, to receive credit for this task, we need to view the Network & Internet Settings dialog box. To do this, click Network & Internet Settings.

6.3.4 Set Up an Ethernet Connection (Simulation) Scenario

You are a network technician for a small corporate network. The owner of the company has asked you to connect a new workstation to the network while a new employee is in an orientation meeting.

Your task in this lab is to:

• Connect the workstation in Office 1 to the Ethernet local area network using an RJ-45 twisted pair cable.


• Confirm that the workstation (named Office1 ) has a connection to the local network and the Internet.


Tip


Tip: Click the Hardware button under Office 1 and go to the workstation

Explanation

To complete this lab, use twisted pair cable with RJ-45 connectors to connect to a wired Ethernet network. RJ-45 connectors have 8 wires (as seen below), and are larger than RJ-11 connectors.

RJ-45

Complete the following steps:

1. Click the Hardware icon shown in Office 1 to go to the workstation.


2. In Office 1, switch to the back view of the computer.


3. On the Shelf, expand the Cables category.


4. Select each cable type. Examine the cable ends in the Selected Component window to identify the cable with RJ-45 connectors.


5. In the Selected Component window, select a cable end. Drag and drop the connector to the Ethernet port on the computer. Ethernet Port


6. In the Selected Component window, drag the other connector to the Ethernet port on the wall outlet.


7. To confirm that the workstation has a connection to the local network and the Internet, click the Windows icon on the monitor.


8. In the notification area, click the network icon and click Network & Internet settings . The diagram should indicate an active connection to the network and the Internet.


6.3.5 Wireless Standards (Lesson Video) Transcript:

For a network to function, all the connected devices need to follow the same set of rules, or protocols. Many of these protocols are defined by the Institute of Electrical and Electronics Engineers, or IEEE. The IEEE 802 family of standards deals mostly with local area networks, and the protocols for wireless networks are found in section 11. A wireless local area network that conforms to 802.11 standards is called a Wi-Fi network. As technology has improved, so have 802.11 protocols. Over time, they have improved in several areas. This video will focus on four: frequency, attenuation, speed, and security.

Wi-Fi signals are sent using radio frequencies. Some standards, like 802.11b and g, used a 2.4 GHz band. This band has eleven channels. Unfortunately, most of these channels overlap with each other. The only non-overlapping channels are 1, 6, and 11. With only three usable channels, it was common for devices using the same network to fight over bandwidth and interfere with each other. To solve this, newer protocols, such as 802.11n and ac, started using a 5 GHz band, which has many more non-overlapping channels.

One of the features of a radio wave is attenuation. As a radio signal travels away from its point of origin, the signal becomes weaker. If you've ever listened to the radio in your car as you've driven out of town, you've experienced attenuation first hand. One of the drawbacks of higher-frequency bands is that they have more attenuation and therefore cover less distance.

Another major difference between protocols is how fast they can transmit data. This is measured in bits per second.

This table compares several versions of the 802.11 protocol. It's not important to memorize this information, but it's right here if you ever need to refer back to it. Today, most wireless networks use one of these two protocols – 802.11n or 802.11ac.

Some Wi-Fi networks, including many public networks, are unencrypted – data moves through the network as plain text. This can be extremely dangerous, as eavesdroppers can easily intercept your signals and steal your information. Some public networks provide the illusion of security by using a captive portal, which makes users agree to some terms of service before accessing the network. Don't be fooled, though; these networks are not secure.

Fortunately, 802.11 contains security protocols, which encrypt transmitted data. The first security protocol was called

WEP, or Wired Equivalent Privacy. This protocol eventually became outdated and was replaced with WPA, or Wi-Fi Protected Access. This, in turn, was upgraded to WPA2, which is the most secure and is used by virtually all secure Wi- Fi networks today.

In this video, we looked at the 802.11 wireless networking protocols. We compared several iterations of the protocols by looking at their frequency, attenuation, and speed. We also briefly discussed three encryption protocols: WEP, WPA, and WPA2.

6.3.6 Wireless Standard Facts

For a network to function, all the connected devices need to follow the same set of rules, or protocols. Many of these protocols are defined by the Institute of Electrical and Electronics Engineers, or IEEE. The following table defines terms related to wireless protocol standards.

Table 1: Wireless Protocol Standards Term

Description


IEEE 802 Standards

The IEEE 802 family of standards deals mostly with local area networks, and the protocols for wireless networks are found in section 11. A wireless local area network that conforms to 802.11 standards is called a Wi-Fi network. As technology has improved, so have 802.11 protocols. Over time, they have improved in several areas.


Encryption Standards

802.11 contains security protocols, which encrypt transmitted data. The first security protocol was called WEP, or Wired Equivalent Privacy. This protocol eventually became outdated and was replaced with WPA, or Wi-Fi Protected Access. This, in turn, was upgraded to WPA2, which is the most secure and is used today by virtually all secure Wi-Fi networks to provide encryption and authentication services. Below is a brief summary of each of these encryption standards:

• WEP is an optional component of the 802.11 specifications and was deployed in 1997. WEP was designed to provide wireless connections with the same security as wired connections. This encryption standard has many weakness and should never be used unless there is no other option (which may be the case with older equipment).


Term Description


• WPA is the implementation name for wireless security based on initial 802.11i drafts. It was deployed in 2003. WPA was intended as an intermediate measure to take the place of WEP while a fully secured system (802.11i) was prepared. It uses Rivest Cipher (RC4) with a 128-bit key and a 48-bit initialization vector (IV) for encryption. It also uses the Temporal Key Integrity Protocol (TKIP) for encryption, making it more secure than WEP.


• WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications and was deployed in 2005. This implementation is built upon the idea of Robust Secure Networks (RSN). Like WPA, it resolves the weaknesses inherent in WEP and replaces both WEP and WPA. One of the main differences between WPA and WPA2 is the use of the Advanced Encryption Standard (AES) with a 128-bit key and a 48-bit initialization vector for encryption, which is more secure than TKIP.


Frequency

Wi-Fi signals are sent using radio frequencies. Some standards, like 802.11b and g, use a 2.4 GHz band. This band has eleven channels. Unfortunately, most of these channels overlap with each other. The only non-overlapping channels are

1, 6, and 11. With only three usable channels, it was common for devices using the same network to fight over bandwidth and interfere with each other. To solve this, newer protocols, such as 802.11n and ac, started using a 5 GHz band, which has many more non-overlapping channels.


Attenuation

One of the features of a radio wave is attenuation. As a radio signal travels away from its point of origin, the signal becomes weaker. If you've ever listened to the radio in your car as you've driven out of town, you've experienced attenuation first hand. One of the drawbacks of higher-frequency bands is that they have more attenuation, and therefore cover less distance.


Speed

Another major difference between protocols is how fast they can transmit data. This is measured in bits per second. The table below compares the maximum transfer rates of several versions of the 802.11 protocol.


Public Wi-Fi

Some Wi-Fi networks, including many public networks, are unencrypted as data moves through the network as plain text. This can be extremely dangerous, as eavesdroppers can easily intercept your signals and steal your information. Some public networks provide the illusion of security by using a captive portal, which makes users agree to some terms of service before accessing the network. Don't be fooled, though; these networks are not secure.


SSID

Wireless devices use the SSID (Service Set Identification) to identify the network name. All devices on a wireless network use the same SSID.


Table 2: 802.11 Standard Comparisons

This table compares several versions of the 802.11 protocol.


Standard

Maximum Transfer Rate Band


802.11a

54 Mbps

5 GHz


802.11b

11 Mbps

2.4 GHz


802.11g

54 Mbps

2.4 GHz


802.11n

150 Mbps

5 GHz


802.11ac

1.7 Gbps

5 GHz

When comparing the different 802.11 standards, consider the following.

• Today, most wireless networks use either 802.11n or 802.11ac.


• The 5 GHz frequency provides 24 channels that do not overlap. 2.4 GHz only has 3 channels that do not overlap.


• Even though 5 GHz bands suffer from greater attenuation and consequently cover less distance, the significantly improved performance of 802.11n and particularly 802.11ac make them better standards in most scenarios.


• Bluetooth is a wireless networking standard that uses 2.4 GHz radio waves. These are the same type of radio waves used with 802.11 wireless networking, but Bluetooth has a maximum transfer rate of 1 Mbps and is used primarily for ad-hoc or impromptu connections between two devices. A typical example is a set of Bluetooth headphones that connects to a laptop computer.


Configuring Wireless Networks

When configuring a wireless network, consider the following to increase productivity and network security:

• In many cases, settings to determine how the clients use your wireless network will be determined through the configuration of the Wi-Fi access point (AP). Accessing the configuration of your AP is normally completed using a web configuration page. When you purchase an AP, the manufacturer will give you instruction on how to access this new device remotely. They will often have some type of program that will located the device for you, but eventually the IP address of the device will be used to access the configuration pages of the AP, allowing you to configure your device.


• Change the default password used to configure the access point. Many APs come with a default password of admin . Since this can be learned by doing an internet search, you should change this password to ensure someone can't configure your AP.


• Eliminate/reduce interference. If you have ever used a cell phone or a wireless computer, you have probably noticed that the Wi-Fi signals can go through such items as wood, glass, brick, and drywall. Metal roofs or other very dense material can block or reduce the Wi-Fi signals. When a Wi-Fi signal is reduced or blocked, this is known as interference. Interference can also be caused by such things as radio-based devices, other Wi-Fi networks that are close, and even electronic devices such as cordless phones, microwave ovens, and fluorescent lights. When a radio signal becomes weaker as the wave travels further from its point of origin is known as attenuation.


• Disable SSID broadcast. This makes the network harder (but not impossible) to locate.


• Change the SSID to something other than the default. This obscures what type of access point is in use.


• When connecting Windows 10 to a wireless network, use the correct location. In Windows 10, selecting Public allows you computer to be hidden and disables file sharing. Selecting Private allows you computer to be discovered and enables file sharing.


6.3.7 Use a Wireless Network (Demo Video) Transcript:

In this scenario, you want to add a USB wireless network interface to a computer to connect to a Wi-Fi network. First, we'll plug in the adapter. Switch to the back view of the computer tower, then zoom in by using the mouse wheel. Open the wireless adapters menu on the shelf, then drag the adapter to an available USB port on the computer.

Now that the adapter's plugged in, we can connect to our Wi-Fi network. Click the monitor to switch to Windows view. Click the wireless network button, then click the name of the network you want to connect to. When you click Connect, you're prompted for the network security key. Carefully type the key into the field, paying attention to which letters are capitals and lower case. Click next. When it asks you if you want your device to be discoverable by other devices on the network, click No. Your computer is now wirelessly connected to your network.

6.3.8 Use a Wireless Network (Simulation)

Scenario

You and your roommates have just set up a wireless router that will serve as a secure wireless access point in your apartment.

Since your desktop computer did not come with built-in WiFi, you will need to install a USB wireless adapter before you can connect to your wireless network.

To complete this lab, do the following:

1. Drag the USB wireless adapter from the Shelf and connect it to a USB port on the back of your computer.


2. Switch to the operating system and connect to your secure wireless network using the following information. o Network Name: Apt-34


o Connect automatically: Enabled


o Network Security Key: @SecurePlace&!


o Allow your PC to be discoverable by other PCs and devices on this network: No


Explanation

To complete this lab, you must perform the following tasks:

1. In the Workspace area, switch to the back of the computer.


2. On the Shelf, expand the Wireless Adapters category.


3. Drag the device from the Shelf to a USB port on the computer.


4. To connect to the wireless network, click the monitor screen.


5. On the System tray in the bottom-right corner of the screen, click the network icon.


6. Select the Apt-34 network.


7. Select Connect automatically , then click Connect .


8. Enter @SecurePlace&! as the network security key, then click Next .


9. Click No to set your network connection as private.


6.3.9 Bluetooth

Bluetooth is a technology that allows wireless communication between devices without using a modem or router. It can be used for a variety of devices, including wireless speakers and headphones to broadcast music from one device to another. This technology lets you create and use what is commonly known as a Personal Area Network, or PAN.

What Is Bluetooth?

Bluetooth Symbol


Bluetooth symbol.

Simply put, Bluetooth is a radio-based technology that allows two nearby gadgets to communicate with each other. A microchip within both devices allows them to communicate wirelessly. Bluetooth transmits small amounts of data over short distances while using as little battery power as possible. Bluetooth can connect up to eight devices at once.

Its strange name comes from a 10th-century Danish king named Harald Bluetooth. He was famous for uniting various

Danish tribes into a single kingdom, much in the same way that Bluetooth technology brings devices together. It was invented in the 1990s by a Dutch electrical engineer named Jaap Haartsen.

Harald "Bluetooth" Blåtand


10th-century Danish king, Harald Bluetooth. How Is Bluetooth Used?


Wireless headphone set.

Photo by Malte Wingen on Unsplash

One common use for Bluetooth is to play music. People use wireless earbuds or headphones to stream music from their smartphone or other device without having to worry about getting tangled up in cords.

Bluetooth can be used to share files between devices. For example, Apple devices have a function called AirDrop, which allows Apple devices of all types to share files over Bluetooth when they're close to each other. There are also

Bluetooth-enabled printers that allow devices to send documents to print wirelessly. Bluetooth is also a good way to connect wireless peripherals, such as a mouse or keyboard, to a computer.

Another use for Bluetooth comes through smart homes, where users can wirelessly control things like the thermostat, lights, and appliances all from a central location. Bluetooth is also used in vehicles to connect devices to the car to stream music, use GPS, or answer phone calls.

Bluetooth is used in the medical field to send information from medical devices directly to computers, which makes medical systems more efficient and accurate.

Bluetooth Class and Version

The level of power or the effective operating range/distance in which Bluetooth devices function is defined by a class rating of 1 through 4. The following table compares the power and range of these three classes:

Table 1: Bluetooth Classes Bluetooth class

Operating Range Maximum permitted Power


Class 1 Primarily for industrial use cases 100 meters or 328 feet

100 mW (20 dBm)


Class 2 Most common used 10 meters or 33 feet

2.5 mW (4 dBm)


Class 3

1 meters or 3 feet

1 mW (0 dBm)


Class 4

0.5 meters or 1.5 feet

0.5 mW (-3 dBm)


As with other technologies, different versions of Bluetooth have been released, starting with version 1 and up to the current version, 5. Each newer version adds benefits and functionality, and the later versions are backward compatible. It is always recommended to use the latest version available.

Table 2: Bluetooth Classes Bluetooth version Features/improvement

Version 1.x

Slow - maximum data of 1 Mbps.


Version 2.x

Used an Enhanced Data Rate (EDR) for faster data transfer speeds of up to 3 Mbit/s.


Version 3.x

Adopted by Bluetooth SIG in 2009 (v3.0 + HS). Provided higher data transfer speeds up to 24 Mbit/s.


Version 4.x

In 2010, support for collecting data from Low Energy (LE) devices was added. This means the power usage is reduced, allowing your batteries to last longer.


Version 5.x

Data transfer speeds of up to 2 Mbps. Can communicate up to 800 feet.


Bluetooth vs. Wi-Fi

Both Bluetooth and Wi-Fi are technologies that provide wireless communication. Though they have some similarities, their main purposes and capabilities differ greatly. The similarities and differences between the two technologies are outlined in the table below.

Table 3: Bluetooth vs. Wi-Fi Comparison


Main Purpose Range Data/Speed Security

Cost Complexity


Bluetooth

Communicate between devices Normally short (most are under 33 feet) Small amount / slower speeds

Low Low

No additional hardware


Wi-Fi

Connect devices to the internet Long (up to 300 feet)

Large amount / faster speeds Potentially high

Higher

Requires additional hardware


Bluetooth Pairing/Bonding

To utilize Bluetooth, two Bluetooth devices need to be paired. Pairing means to exchange of security features to ensure the connection is safe. Among other things, this includes encryption. After your devices have been paired, they no longer need to exchange this type of information and can share encrypted data. At this point, the devices are then considered to

be bonded.

How you pair your devices will differ depending on the manufacture and the device. For some devices, like a mouse, you may only need to press a button located on the mouse. Other devices, such a smartphone or a Windows computer, have settings that require configuration. For example, when working with Windows 10, you can use the Settings app.

If you no longer want two devices to be paired/bonded, you can break the bond using that devices process, which will also differ depending on the device. For example, to unpair an Apple Watch from an iPhone, you would used the Watch app. In Windows 10, you can use the Bluetooth icon found in the notification area.

6.3.10 Pair Bluetooth Headphones with a Mobile Device (Demo Video) Transcript:

In this lab, you want to pair some Bluetooth headphones with an iPad. To start, drag the headphones from the shelf to the workspace. Press the power button to turn the headphones on. Then, click the iPad screen. Open the Settings app. On the left side of the screen, click Bluetooth. Click to the side of this switch to turn Bluetooth on. Select the headphones from the list of devices. After a short wait, the headphones are connected to the iPad.

6.3.11 Pair Bluetooth Headphones with a Mobile Device (Simulation) Scenario

You recently purchased a set of Bluetooth headphones that you want to connect with your iPad. In this lab, your task is to complete the following:

• Add the Bluetooth headphones to the Workspace.


• Place the headphones into pairing mode.


• Configure your iPad to connect to the headphones: o Enable Bluetooth on the iPad. o Pair the Bluetooth headphones with the iPad.


Explanation

In this lab, your task is to complete the following:

• Add the Bluetooth headphones to the Workspace.


• Turn the headphones on to place them into pairing mode.


• Configure your iPad to connect to the headphones: o Enable Bluetooth on the iPad. o Pair the Bluetooth headphones with the iPad.


Complete this lab as follows:

1. Place the Bluetooth headphones into pairing (or discoverable) mode as follows: a. To add the headphones to the Workspace, expand the Speakers category on the Shelf.


b. Drag the headphones from the shelf and drop them between or after existing objects on the Workspace.


c. Press the power button on the headphones. Wait until the LED light begins flashing red and blue.


a. On the Workspace, click the iPad screen to view iOS.


b. Select Settings .

c. From the left menu, select Bluetooth .


d. Next to Bluetooth, click the switch to begin searching for discoverable devices.


e. When you see the headphones in the list, select them to pair and connect.


f. Wait a few seconds until the headphones are listed as connected.


2. Configure your iPad to connect to the headphones as follows:


6.3.12 Configure Network Printing (Demo Video) Transcript:

In this scenario, you need to share a printer with the rest of your network. First, right-click Start then click Settings. Click Devices, then Printers & scanners. Select the LaserJet printer, then click Manage. Click Printer Properties. On the sharing tab, check Share this printer. Type a new share name into this field, then click OK.

Next, we'll add the shared printer to another computer. Open the Floor 1 Overview, then go to the Office2 computer. Follow the same steps as before. Right-click Start then click Settings. Click Devices, then Printers & scanners. When you click Add a printer or scanner, this computer will find the shared printer on the network. Select it and click Add device. Finally, let's make this our default printer. Select it from the list down here, click Manage, then click Set as default.

6.3.13 Configure Network Printing (Simulation) Scenario

You have connected a printer directly to the Office1 computer. Now you need to share this printer with other users on the network.

In this lab, your task is to share the printer on the Office1 computer and then add the shared printer to the Office2 computer as follows:

• On Office1: o Share the HP LaserJet 3050 PCL 6 printer using the share name HPLaser3050 (no space in the name). o While sharing the printer: . Allow clients to render print jobs on their own computers.

. List the printer in the directory.


• On Office2: o Add the shared HPLaser3050 printer connected to Office1 to the list of available printers. o Make HPLaser3050 the default printer.


Explanation

Complete this lab as follows:

1. On Office1, share a printer. a. Right-click Start and then select Settings .

b. Select Devices .


c. From the left pane, select Printers & scanners .


d. Select HP LaserJet 3050 PCL 6 .


e. Select Manage .


f. Select Printer properties .


g. Select the Sharing tab.


h. Select Share this printer .


i. In the Share name field, use the share name of HPLaser3050 (no space in the name).


j. Ensure that the following options are marked: . Render print jobs on client computers


. List in the directory


k. Select OK .


a. From the top navigation area, select Floor 1 Overview .


b. Select Office2 .


c. Right-click Start and then select Settings .


d. Select Devices .


e. From the left pane, select Printers & scanners .


f. Select Add a printer or scanner .


g. Select HPLaser3050 on Office1 and then select Add device .


a. Under Printers & scanners, select HPLaser3050 on Office1 .


b. Select Manage .


c. Select Set as default .


2. On Office2, add the shared HPLaser3050 printer.


3. On Office2, configure HPLaser3050 as the default printer.

6.3.14 Create a Home Wireless Network (Demo Video) Transcript:

In this scenario, you have a small Ethernet network with two desktop computers. These computers are each connected to this router, which is connected to the wall plate. You want to add a wireless access point to connect your laptop to the network. To start, drag the wireless access point to the workspace. This access point needs a data connection and a power connection to work. We'll start with the data connection. Select a Cat6 cable from the shelf. Plug one end into the access point and the other end into the router. Next, we'll take care of the power connection. Select the power adapter from the shelf. Plug the DC end into the access point and the AC end into the surge protector.

Now that our access point is set up, we can establish a wireless network connection on the laptop. First, let's zoom in on the front of the laptop. Here, we can see a wireless switch, which is currently turned off. We'll click it to turn it on. Then, we'll click the monitor. This is the wireless network icon. If we click it, we can see our wireless network here at the top. Click it, then click connect. Since this is a private home network, be sure to make the laptop discoverable by other computers.

6.3.15 Create a Home Wireless Network (Simulation) Scenario

You are in the process of setting up a small office/home office (SOHO) network. You recently changed your Internet Service Provider (ISP) and have an existing Ethernet router connected to an RJ45 jack on the wall plate. You have a new laptop and would like to connect this laptop to the internet with a wireless connection. You need to create a wireless network.

In this lab, your task is to create a wireless network as follows:

• Install the wireless access point as follows: o Place the 802.11b/g/n wireless access point on the computer desk.


o Use an RJ-45 cable to connect the wireless access point to a free LAN port on the existing router.


o Use a power adapter to connect the wireless access point through an outlet on the surge protector or wall plate.


• Configure the new laptop to connect to the wireless network: o Slide the wireless switch on the front of the laptop to the On position. This will enable the integrated wireless network interface card on the laptop.


o Use the default settings as you connect the laptop to the TrendNet-BGN wireless network. Allow the laptop to be discoverable by other devices on the network.


Explanation

In this lab, your task is to create a wireless network as follows:

• Install the wireless access point as follows: o Place the 802.11b/g/n wireless access point on the computer desk.


o Use an RJ-45 cable to connect the wireless access point to a free LAN port on the existing router.


o Use a power adapter to connect the wireless access point through an outlet on the surge protector or wall plate.


• Configure the new laptop to connect to the wireless network: o Slide the wireless switch on the front of the laptop to the On position. This will enable the integrated wireless network interface card on the laptop.


o Use the default settings as you connect the laptop to the TrendNet-BGN wireless network. Allow the laptop to be

discoverable by other devices on the network.


Complete this lab as follows:

1. Select and install a wireless access point on the Workspace as follows: a. On the Shelf, expand Wireless Access Points .


b. Drag the Wireless Access Point, 802.11b/g/n to the Workspace.


c. Above the wireless access point, select Back to switch to the back view of the wireless access point.


2. Provide power to the wireless access point as follows: a. On the Shelf, expand Cables .


b. Select the Power Adapter .


c. In the Selected Component window, drag the DC Power Connector to the port on the wireless access point.


d. In the Selected Component window, drag the AC Power Adapter end to an outlet on the surge protector.


3. Connect the wireless access point to the router as follows: a. On the Shelf, select the Cat6a cable .


b. In the Selected Component window, drag a connector to the Ethernet port on the back of the wireless access point.


c. Above the router, select Back to switch to the back of the router.


d. In the Selected Component window, drag the other connector to one of the free LAN ports on the switch.


4. On the front of the laptop, click the wireless switch to enable the integrated wireless network interface on the laptop. This will slide the switch to the ON position.


5. Connect the laptop to the TrendNet-BGN wireless network and create a wireless network profile as follows: a. On the laptop's monitor, select Click to view Windows 10 .


b. In the notification area, select the Network icon.


c. Select TrendNet-BGN .


d. Make sure Connect automatically is selected.


e. Select Connect .


f. Select Yes to make the computer discoverable on the network.

6.3.16 Section Quiz (Section Quiz) q_itf_standards_80211ac

Which of the following 802.11 standards measures its maximum transfer rate in Gbps (gigabytes per second)? Answers:

• 802.11a


• *802.11ac


• 802.11g


• 802.11n


Explanation:

The maximum transfer rate for the 802.11ac standard is 1.7 Gbps (gigabytes per second). The maximum transfer rate for the 802.11a standard is 54 Mbps (megabytes per second). The maximum transfer rate for the 802.11g standard is 54 Mbps (megabytes per second). The maximum transfer rate for the 802.11n standard is 150 Mbps (megabytes per second). q_itf_standards_80211n_01

Which of the following is an advantage of using an 802.11n/ac standard over an 802.11b/g standard for a wireless network?

Answers:

• An 802.11n/ac standard covers more distance.


• An 802.11n/ac standard is encrypted.


• *An 802.11n/ac standard has many more non-overlapping channels.


• An 802.11n/ac standard provides Bluetooth wireless networking.


Explanation:

The 802.11b and g standards use a 2.4-GHz band, which only provides three non-overlapping channels. Newer protocols, such as 802.11n and ac, use a 5-GHz band, which provides 24 non-overlapping channels.

One of the drawbacks of higher-frequency bands (such as 5 GHz) is that they have more attenuation, so they cover less distance.

All 802.11 standards can provide encrypted data using security protocols such as WEP or WPA.

Bluetooth wireless networking is its own networking standard and is not a feature of the 802.11n/ac standard. q_itf_standards_80211n_02

David wants to purchase a wireless router for his SOHO (Small Office/Home Office) network that can provide a 2.4- GHz (Gigahertz) frequency band for guests, and a 5-GHz frequency band for his business needs.

Which of the following 802.11 wireless standards can provide both bands? Answers:

• 802.11ac


• 802.11g


• 802.11b


• *802.11n

Explanation:

The 802.11n frequency standard is designed to provide both the 2.4 GHz (Gigahertz) and 5 GHz frequency bands. The 802.11ac frequency standard is designed to provide only the 5 GHz frequency band.

The 802.11g frequency standard is designed to provide only the 2.4 GHz frequency band. The 802.11b frequency standard is designed to provide only the 2.4 GHz frequency band. q_itf_standards_ap_01

A network administrator for a legal firm has installed a Wi-Fi access point in company headquarters and is now ready to configure the access point from a company laptop computer. What is the first step that the administrator needs to take to begin configuring the access point?

Answers:

• Enter the SSID of the access point.


• Establish a Bluetooth connection.


• *Enter the IP address of the access point web configuration page.


• Select the correct 802.11 standard.


Explanation:

Accessing the configuration of your access point is normally completed using a web configuration page which is normally accessed by using the IP address of the device.

While configuring the SSID (Service Set Identification) is part of configuring the access point, it is not used to access the configuration pages.

Bluetooth is a technology that allows wireless communication between devices without using a modem or router. However, in this case, the administrator is attempting to access the AP router to configure the wireless network.

The 802.11 standard for the access point is already established by the manufacturer and is not part of configuring the access point.

q_itf_standards_ap_02

A network administrator is setting up a new wireless network access point. What should the administrator do to ensure the security of the router and network? (Select two.)

Answers:

• Change the frequency band of the router.


• Set the wireless network encryption standard to WPA2.


• *Change the admin password used to configure the network router.


• *Change the network SSID (Service Set Identification).


• Eliminate or reduce interference.


Explanation:

Because the admin password is used to configure the router, it is critical that the administrator change the password in order to keep the router secure.

The administrator should change the name (SSID) of the wireless network to something other than the default to help obscure what type of access point is in use.

The frequency band of the router is already determined by the manufacturer and is not a factor in securing the router.

An encryption standard (such as WEP or WPA) is a protocol designed to encrypt data sent over the wireless network, but does not secure the router or network.

Eliminating or reducing interference protects and enhances the performance of the wireless network, but does not secure

the router or the network. q_itf_standards_facts_01

Which of the following are characteristics of Bluetooth? (Select two.) Answers:

• *2.4 GHz radio wireless


• 5.75 GHz radio wireless


• Line-of-sight transmission


• Red spectrum light waves


• *Ad hoc connections


Explanation:

Bluetooth is a wireless networking standard that uses 2.4 GHz radio waves. These are the same type of radio waves used with 802.11 wireless networking, so radio transmission can go through walls (not limited to line-of-sight connections). Bluetooth uses ad hoc connections between devices. Infrared uses red spectrum light waves and is limited to line-of-sight transmissions.

q_itf_standards_facts_02

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) Answers:

• *802.11a


• Bluetooth


• 802.1x


• 802.11b


• *802.11g


Explanation:

Both the 802.11a and the 802.11g wireless standards specify maximum transmission speeds up to 54 Mbps. Bluetooth is a wireless standard commonly used to connect peripheral devices and operates at 720 Kbps. The 802.11b wireless standard provides transmission speeds of 11 Mbps. 802.1x is a wireless security standard that provides an authentication framework for 802-based networks.

q_itf_standards_facts_03

Which of the following is used on a wireless network to identify the network name? Answers:

• *SSID


• MAC address


• WEP key


• WPA2 passphrase


Explanation:

Wireless devices use the SSID (Service Set Identification) to identify the network name. All devices on a wireless network use the same SSID. The MAC address is a unique physical device address. The WPA2 Personal passphrase and

the WEP key are both mechanisms used to secure wireless communications. q_itf_standards_facts_04

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

Answers:

• WEP


• WPA


• *WPA2


• Kerberos


Explanation:

Wi-Fi Protected Access 2 (WPA2) is currently the most secure wireless security specification. WPA2 includes specifications for both encryption and authentication. WPA was an earlier implementation of security specified by the 802.11i committee. WEP was the original security method for wireless networks. WPA is more secure than WEP, but less secure than WPA2. Kerberos is an authentication method, not a wireless security method. q_itf_standards_facts_05

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device.

• They use an 802.11n wireless network.


• The wireless network is broadcasting an SSID of Linksys.


• The wireless network uses WPA2 with AES security.


• Directional access points are positioned around the periphery of the building.


Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)

Answers:

• *Disable SSID broadcast.


• *Change the SSID to something other than the default.


• Configure the wireless network to use WPA with TKIP security.


• Upgrade to an 802.11g wireless network.


• Implement omnidirectional access points.


Explanation:

You should recommend the following:

• Disable SSID broadcast. This makes the network harder (but not impossible) to locate.


• Change the SSID to something other than the default. This obscures what type of AP is in use.


Using WPA instead of WPA2 would decrease the security of the wireless network as would implementing omnidirectional APs. Switching to an 802.11g network would dramatically reduce the speed of the network without

providing any security enhancements. q_itf_standards_facts_06

Which of the following features is supplied by WPA2 on a wireless network? (Select two.) Answers:

• *Encryption


• Refusal of client connections based on MAC address


• Filtering of traffic based on packet characteristics


• Identification of the network


• Centralized access for clients


• *Authentication


Explanation:

Wi-Fi Protected Access 2 (WPA2) provides encryption and authentication for wireless networks.

MAC address filtering allows or rejects client connections based on the hardware address. The SSID is the network name or identifier. A wireless access point (called an AP or WAP) is the central connection point for wireless clients. A firewall allows or rejects packets based on packet characteristics (such as address, port, or protocol type). q_itf_standards_facts_07

Which of the following provides security for wireless networks? Answers:

• WAP


• *WPA2


• 802.3u


• CSMA/CD


• 802.11a


Explanation:

Wi-Fi Protected Access (WPA and WPA2) provides encryption and user authentication for wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA is considered more secure than WEP. A wireless access point (WAP) is a hardware device, like a switch, that provides access to the wireless network. 802.11a is a wireless networking standard that defines the signal characteristics for communicating on the wireless network. CSMA/CD is a media access control method that controls when a device can communicate on the network.

q_itf_standards_facts_08

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

Answers:

• *5 GHz


• 2.4 GHz


• 802.11b


• 802.11g

Explanation:

The 5 GHz frequency provides the most channels that do not overlap. 2.4 GHz only has 3 channels that do not overlap. The protocols 802.11b and 802.11g operate at the 2.4 GHz frequency.

q_itf_standards_facts_09

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

Answers:

• 802.11a


• 802.11b


• 802.11g


• *802.11n


Explanation:

The 802.11n wireless standard supports a maximum transfer rate of 150 Mbps on the 5 GHz band. Today, most wireless networks use either 802.11n or 802.11ac.

802.11a supports up to 54 Mbps on the 5 GHz band. 802.11b supports up to 11 Mbps on the 2.4 GHz band. 802.11g supports up to 54 Mbps on the 2.4 GHz band.

q_itf_standards_facts_10

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Answers:

• *Improved performance


• Less attenuation


• More overlapping channels


• 802.11g uses older technology


Explanation:

802.11ac provides substantially improved transfer rates. Attenuation is a result of the transmission media.

802.11ac uses 5GHz which has more non-overlapping channels compared to 802.11g. More overlapping channels can be problematic.

The fact that 802.11g uses older technology is a negative, but the best reason is the improved performance offered by 802.11ac.

q_itf_standards_interference

Sarah has set up a home office using her old 802.11g wireless router and a cordless phone to use for business calls. When she is on a call with her cordless phone and tries to access the internet on her computer, the internet performance slows down significantly.

Which of the following BEST describes the problem the cordless phone is causing? Answers:

• *Interference


• Attenuation


• Frequency

• Speed


Explanation:

Interference can reduce or block Wi-Fi signals and can be caused by dense material (such as steel) or by an electronic device (such as a cordless phone).

Attenuation is a characteristic of radio waves where the signal becomes weaker as the wave travels farther. In this case, the cordless phone is causing the problem by causing interference that is weakening the Wi-Fi signal.

Frequency is a characteristic of a radio signal that carries digital information in a wireless network. Even though her wireless router is providing a 2.4-GHz frequency, the problem is with interference from the cordless phone.

While data transfer speed is a characteristic of 802.11 standards, the problem in this scenario is with interference from the cordless phone interfering with the Wi-Fi signal.

q_itf_standards_ip

You are installing a new wireless router for a client. You have connected the router to the modem and need to configure the settings. Which of the following will allow you to access the router configuration?

Answers:

• Right-click the router in Device Manager and select Properties.


• Right-click the router in Device and Printers and select Properties.


• *Type the router's IP address into the web browser to access the configuration page.


• Type the router's MAC address into the web browser to access the configuration page.


Explanation:

In many cases, settings to determine how the clients use your wireless network will be determined through the configuration of the Wi-Fi access point (AP). Accessing the configuration of your AP is normally completed using a web configuration page. When you purchase an AP, the manufacturer will instruct you on how to access this new device remotely. They will often have

some type of program that will located the device for you, but eventually, the IP address of the device will be used to access the configuration pages of the AP, allowing you to configure your device.

None of the other options will allow you to access the router's configuration page. The router would not show up in the Device Manager nor in Devices and Printers. The router's MAC address is a unique hardware ID that is not used to access the device's configuration page.

q_itf_standards_public

Carol is connecting to a wireless network from her Windows 10 laptop and wants to make sure that her laptop is hidden from other computers on the network and that file sharing is disabled. Which of the following wireless network options should Carol select to enable these features?

Answers:

• Connect automatically


• Network security key


• *Public


• Private


Explanation:

When you select the Public setting in Windows to connect to a Wi-Fi network, your computer is hidden from other computers connected to the network, and file sharing is disabled. This is the solution Carol needs.

When you select the Private setting in Windows to connect to a Wi-Fi network, the computer can be seen by other computers on the network, and you can share files. This is the opposite of what Carol needs.

When you connect to a wireless network in Windows, the Connect automatically option is enabled, which means that Windows saves any password and tries to connect to the network again (when it is in range). This option would not protect a laptop from being seen on the network or from file sharing.

The network security key is the password to access the wireless network and is not designed to protect a laptop from being seen on the network or from file sharing.

q_itf_standards_wap2

Which of the following is the maximum bit length for WPA2 (Wi-Fi Protected Access 2) binary encryption keys? Answers:

• *256 bits


• 56 bits


• 32 bits


• 16 bits


Explanation:

WPA2 (Wi-Fi Protected Access 2) uses AES (Advanced Encryption Standard), which provides keys that can be up to 256 bits long.

Data Encryption Standard (DES) encryption used 56-bit binary keys. DES is not the binary encryption standard used for WPA2.

Integer encoding uses 32 bits to represent a positive or negative value followed by the encoded integer itself. This is not the binary encryption standard used for WPA2.

Audio files have a depth of 16 bits. This is not the binary encryption standard for WPA2. q_itf2_bluetooth_device

Which of the following BEST describes the difference between Bluetooth and Wi-Fi? Answers:

• Bluetooth provides a higher security level than Wi-Fi.


• *Bluetooth communicates between devices; Wi-Fi connects devices to the nternet.


• Bluetooth provides a longer broadcast range than Wi-Fi.


• Bluetooth broadcasts large amounts of data at faster speeds; Wi-Fi broadcasts small amounts of data at slower speeds.


Explanation:

Both Bluetooth and Wi-Fi are technologies that provide wireless communication. Though they have some similarities, their main purpose differs greatly. Bluetooth is designed to communicates between devices; Wi-Fi is designed to connect devices to the Internet.

The security level for Wi-Fi is potentially much higher than for Bluetooth, especially when using encryption protocols (such as WPA2) with Wi-Fi.

The broadcast range for Bluetooth is normally under 33 feet, which is much shorter than the broadcast range for Wi-Fi, which is up to 300 feet.

Wi-Fi broadcasts large amounts of data at faster speeds, while Bluetooth broadcasts small amounts of data at slower speeds.

6.4 Internet Connectivity Section Introduction

As you study this section, answer the following questions:

• What is the relationship between an ISP and the internet?


• When might it be beneficial to use a VPN?

• What are the benefits and drawbacks of different types of internet connections?


In this section, you will learn to:

• Describe the relationship between ISPs and the internet.


• Compare and contrast internet service options.


• Use a cable modem to connect a small home office network to the internet.


• Explain how successive generations of cellular technologies impact mobile internet speed.


• Describe how to use a virtual private network (VPN) to create a secure connection over the internet.


• Configure a wireless infrastructure for internet connectivity. o Install a cable modem to a WAN connection.


o Install a wireless router.


o Connect the internet port on a router to a cable modem.


o Connect a computer to a LAN port on a wireless router.


• Configure an iPad to use SSL to securely communicate with an email server.


• Connect an iPad to a secure wireless network.


• Configure a VPN connection on a laptop computer with the following settings. o VPN server address.


o Secure Socket Tunneling Protocol (SSTP).


o Secure password-based authentication protocol.


• Connect a laptop to a VPN.


Key terms for this section include the following:

Term Definition


Dial up

A technology used in the early days of the internet that required a computer to make a phone call to the ISP to establish internet connectivity.


Digital Subscriber Line (DSL)

A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.

Cable

A technology that uses cable TV lines to establish high-speed connectivity to the internet through an ISP.


Fiber optic

A technology that uses fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP.


Satellite

A technology that sends signals to and from a satellite to establish connectivity to the internet through an ISP.


Cellular

A technology that uses cellular radio signals to establish connectivity to the internet.


Wi-Fi

A technology that uses radio signals to connect a device to an access point.


Virtual Private Network (VPN)

A tool that allows internet users to create a secure, private network when using a public internet connection. A VPN masks a user's IP address to make actions untraceable and shields the user's data from others.


Uplink

The data being transferred from your computer to the ISP.


Downlink

The data being transferred from the ISP to your computer.


Hotspot/tethering

The process of providing access to a computer through the mobile device's cellular connection.


6.4.1 Internet Service Types (Lesson Video) Transcript:

Even if you have a computer with a working network interface, you don't necessarily have access to the Internet. Just like a highway has access points like intersections or on ramps, the Information Superhighway has access points called Internet Service Providers, or ISPs. An ISP acts as a gateway between your computer and the public Internet. Generally, you have to pay a monthly fee to get Internet access from an ISP. In this video, we'll look at several ways ISPs can transfer data between your computer and the Internet.

In the early days of the Internet, most home computers used a dial-up connection. To get Internet access, the computer would make a phone call to the ISP. Just like a regular voice call, this call was an analog signal – as the computer dialed in, you could actually hear the sound of the data. A device called a modem, or modulator/demodulator, sat between the computer and the phone line. The modem turned digital data from the computer into analog sound data for the phone line and the other way around. Compared to modern service, dial-up connections were extremely slow. They also used up the phone connection. If your mom needed to make a phone call while you were in the middle of a game of Starcraft, you were outta luck.

Fortunately, a better alternative to dial up quickly emerged. Digital Subscriber Line, or DSL, uses the same phone connection as dial up. However, DSL signals are sent using the high-frequency ranges that voice calls don't need to use, which means the data connection doesn't use up the phone connection. With DSL, kids can play online games and their moms can talk on the phone at the same time!

Phone lines aren't the only way ISPs can send signals. They can also send them over television cables. Cable Internet is generally provided by the same company that sends cable TV signals to your house. Since cable companies can already send multiple TV channels on the same cable, they can easily add a few extra channels for data. Just like with dial up, cable connections require a modem to convert analog cable signals into digital computer signals.

Another option that's becoming increasingly common is fiber optic. Fiber networks use fiber optic cables to send signals

with light instead of electricity. This has a few considerable advantages – light isn't vulnerable to electromagnetic interference and has potential for much higher speeds than DSL or cable. The downside is that fiber networks are expensive to build, so many areas don't have access to a fiber connection.

So far, all the service types we've looked at require physical wires to transmit data. However, if you live in a rural area, there's a good chance you don't have a nearby wired network to connect to. Fortunately, you can still connect to the Internet via a satellite connection. By aligning a satellite dish to an orbital satellite hovering above the equator, you can get data from the Internet from nearly anywhere in the world. The main downside of a satellite connection is latency – because the data has to travel to space and back, it can take a few seconds longer to exchange data. While this may not seem like much, it makes a big difference for real-time applications like online gaming and video conferencing.

Phones and other mobile devices use cellular connections. Using radio signals, phones connect to the nearest cellular base station, which is usually a tall tower. Unlike the other types of connections we've seen here, cellular data is likely to be rate limited. Instead of paying a monthly fee for as much data as you want, cellular providers generally limit the amount of data you can download.

Because of this, many cell phone owners use a technology called Wi-Fi whenever they can. Wi-Fi uses radio signals to connect a cell phone to a smaller network, which in turn can be connected to an ISP. By using Wi-Fi, you can download data to your phone over a wired Internet connection like DSL or fiber. This way, you don't run into the data limits imposed by cellular data plans. In addition to cell phones, Wi-Fi can be used by laptops and other devices with wireless capabilities.

In this video, we described several ways ISPs can send data to their customers. We looked at dial up, DSL, Cable, Fiber Optic, Satellite, and Cellular. We also talked about Wi-Fi, which can connect mobile devices to a wired network.

6.4.2 Internet Service Facts

Internet Service Providers (ISPs) act as a gateway between your computer and the public internet. Generally, you have to pay a monthly fee to get internet access from an ISP.

This lesson describes several ways ISPs can transfer data between your computer and the internet. ISP Service Types

When discussing how data is transferred to and from the ISP, uplink refers to data being sent to the ISP from your computer. Downlink is the data being downloaded from the ISP to your computer.

Table 1: ISP Service Types ISP SERVICE TYPE DESCRIPTION


Dial Up

In the early days of the internet, most home computers used a dial-up connection. To get internet access, the computer would make a phone call to the ISP. Just like a regular voice call, this call was an analog signal. As the computer dialed in, you could hear the sound of the data. A device called a modulator/demodulator (modem) sat between the computer and the phone line. The modem converted digital data from the computer into analog sound data for the phone line. For data coming to your computer from the internet, analog data from the phone was converted to digital data for your computer. The main disadvantages to dial-up connections were that they were extremely slow and they tied up the phone line.


Digital Subscriber Line (DSL)

DSL is a better alternative to dial up. It uses the same phone connection as dial up; however, DSL uses the high- frequency ranges that voice calls don't use. This means that the data connection doesn't use the phone connection. With DLS, a phone call can be made while someone is connected to the internet. DSL is also considered to be asymmetric (ADSL). This means that the bandwidth and bit rate is faster while downloading data than it is while uploading data.

Download speeds can reach up to about 24 Mbps while the upload speed are around 1.4 Mbps.


Cable

Phone lines aren't the only way ISPs can send signals. They can also send them over television cables (as part of the Cable Access TV-CATV service). Cable internet is generally provided by the same company that sends cable TV signals to your house. Since cable companies can already send multiple TV channels on the same cable, they can easily add a few extra channels for data. This is sometimes called a Hybrid Fiber Coax (HFC) because fiber optic is used from the source to an area near the destination. Then the coax cable is used the rest of the way. Cable connections require a cable

modem to receive the signal from a coaxial cable. The modem converts the signal to digital data, typically transmitted over copper Ethernet cables. The standard used for CATV are set by the Data Over Cable Service Interface Specifications (DOCSIS). DOCSIS has several specifications, such as DOCSIS 1.0, 2.0, 3.0, and DOCSIS 3.1. Each version provides more features and better download speeds. For example v3.0 supports about 1.2 Gbps download speeds while 3.1 can support up to 10 Gbps download speeds.


Fiber Optic

Fiber networks use fiber optic cables to send signals with light instead of electricity. This has a few considerable advantages. Light isn't vulnerable to electromagnetic interference. It has potential for much higher speeds than DSL or cable. The downside is that fiber networks are expensive to build. Due to costs, many areas don't have access to a fiber connection.


As you begin to work with or consider using fiber optics, you should be familiar with the following terms:

• Fiber to the Home (FTTH) is also called fiber to the premises (FTTP). FTTH uses fiber cable from the source to your home or business. A good example of this is Google Fiber which is part of the Access division of Alphabet Inc.


• Fiber to the Curb (FTTC) brings the fiber cable from the source to a pole or closet that houses the mounted communications device. FTTC can serve many customers within about 1,000 feet. FTTC uses twisted pair copper wires (telephone cabling) and Very High Bit Rate DSL (VDSL). FTTC is less expensive than FTTH.


Satellite

Many ISP service types require physical wires to transmit data. However, those who live in rural areas don't have a wired network to connect to. Fortunately, they can connect to the internet via a satellite connection. By aligning a satellite dish (antenna) to an orbital satellite hovering above the equator, you can get internet access from nearly anywhere in the world. The main downside is latency. Because the data has to travel to space and back, it can take a few seconds longer to exchange data. While this may not seem like much, it makes a big difference for real-time applications like online gaming and video conferencing. The satellite dish is usually installed by the ISP with a coaxial cable going from the dish to a Digital Video Broadcast Satellite (DVB-S) modem, which can be installed in a computer using an expansion card. In some cases, you can use an external modem attached to the computer using a USB connection.


Cellular

Phones and other mobile devices use cellular connections. Using radio signals, phones connect to the nearest cellular base station, which is usually a tall tower. Unlike the other types of connections, cellular data is likely to be rate limited. Instead of paying a monthly fee for as much data as you want, cellular providers generally limit the amount of data you can download. For a mobile device, such as a phone, cellular gives the user access to the internet. Using a hotspot (sometimes called tethering) a mobile device can provide internet access to a computer through its cellular connection.


Wi-Fi

Wi-Fi uses radio signals to connect a cell phone to a smaller network, which in turn can be connected to an ISP. By using Wi-Fi, you can download data to your phone over a wired internet connection like DSL or fiber. Since you don't run into the data limits imposed by cellular data plans, many cell phone owners prefer to use Wi-Fi whenever they can. In addition to cell phones, Wi-Fi can be used by laptops and other devices with wireless capabilities.


6.4.3 Connect a Cable Modem (Demo Video) Transcript:

In this scenario, you're setting up your computer to receive signals from your cable Internet service provider. The cable

company has already installed a data line to your home. The line goes through the outside wall and enters the house through this port. To get the data to your computer, you need to install a cable modem. This will translate the analog cable signal into a digital signal your computer can understand. It will also translate digital signals from your computer into analog signals that can be sent back to the ISP through the cable.

First, we'll add the cable modem to the workspace. Open the modems menu, then drag the modem out until you see a yellow outline, then release the mouse. Click this button to view the back of the modem. Throughout this lab, you can zoom in and out by using the scroll wheel on the mouse.

First, we'll attach the modem to the wall plate. Open the cables menu, then click the RG-6 coaxial cable. Down here, we see the two ends of the cable. Drag one end to this port on the modem. Then, drag the other end to the wall plate.

Next, we'll attach the modem to our computer. First, switch to the back view of the computer. Then select the Cat6a cable on the shelf. Drag one end of the cable to the RJ-45 port on the back of the modem and the other end to the port on the back of the computer.

Finally, we have to plug the modem into a power outlet. Click the power adapter on the shelf. Drag the AC power adapter to the wall outlet and the DC power connector to the port on the back of the modem.

Now that the modem is connected, let's check to make sure we have Internet access. Click the monitor to switch to Microsoft Windows view. If we click the network icon, it tells us that we're connected to the Internet. However, to get points for the task, we need to view the Network and Internet Settings dialog.

6.4.4 Connect a Cable Modem (Simulation) Scenario

You are working on a small office/home office (SOHO) network. You have just signed up for cable Internet access for the network. The cable company has installed the line into your home, and given you a preconfigured modem for your network.

All connectors on the wall plate are for WAN connections only. You do not have LAN connections inside your home. Your task in this lab is to:

• Connect the components to make the Internet connection. o Add the cable modem to the Workspace.


o Connect the modem to the WAN connection using an RG-6 coaxial cable.


o Connect the computer to the cable modem using a 10/100 Mbps Ethernet connection (RJ-45 cable).


o Use the AC to DC power adapter to plug in the modem.


• Use the Network & Internet Settings dialog to confirm that the computer is properly connected to the Internet.


In this lab, the modem was preconfigured with the correct settings to make the connection to the Internet Service Provider (ISP) and the Internet.

Explanation

To complete this lab:

• Add the cable modem to the Workspace. Connect the modem to the WAN connection using the RG-6 coaxial cable. Both RG-6 and RG-59 are 75 ohms and can be used, but RG-6 has less signal loss than RG-59. RG-58 cables are used for 10Base2 Ethernet and have a BNC connector.


• Connect the computer to the cable modem using a Cat6a Ethernet cable.


• Use the AC to DC power adapter to plug in the modem.


Complete the following steps:

1. On the Shelf, expand the Modems category.

2. Drag the cable modem from the Shelf to the Workspace.


3. To connect the modem to the Internet connection, switch to the back view of the cable modem.


4. On the Shelf, expand the Cables category.


5. Select the RG-6 coaxial cable.


6. In the Selected Component window, drag a connector to the port on the cable modem.


7. In the Selected Component window, drag the other connector to the port on the wall plate.


8. To connect the computer to the cable modem, switch to the back view of the computer.


9. On the Shelf, select the Cat6a Ethernet cable.


10. In the Selected Component window, drag a connector to the Ethernet port on the cable modem.


11. In the Selected Component window, drag the other connector to the Ethernet port on the computer.


12. To plug in the cable modem, select the power adapter on the Shelf.


13. In the Selected Component window, drag the DC power connector to the port on the cable modem.


14. In the Selected Component window, drag the AC adapter end to the power outlet.


15. Click the Windows icon on the monitor.


16. In the notification area, click the networking icon and click Network & Internet settings . The diagram should indicate an active connection to the home network and the Internet.


6.4.5 Configure a Wireless Infrastructure (Demo Video) Transcript:

In this lab, you need to connect a computer to the Internet using a cable Internet service. The ISP has already sent a technician, who connected the provider's network to your house through this wall plate. Now, we need to configure our local network. To start, we'll drag the cable modem to the workspace. A cable modem translates signals from coaxial cable to twisted pair and back again. This modem needs two connections – a data connection and a power connection. We'll handle the data connection first. Select the coaxial cable from the shelf. Drag one end to the port on the modem and the other end to the wall plate. Next, let's handle the power connection. Select a power adapter from the shelf. Drag the DC end to the modem and the AC end to a wall outlet.

Next, we'll set up our Ethernet router. Like most home routers, this device is actually a router, switch, and wireless access point all in one. It will connect to the modem and to each host on our network. First, we'll take care of its power connection. Select the power adapter form the shelf. Drag the DC end to the router and the AC end to the wall outlet. Next, we'll handle its data connection. Select a Cat6 cable from the shelf. Drag one end to the cable modem and the other end to the Internet port on the router.

Finally, let's connect our computer to the network. Select the remaining Cat6 cable. Drag one end to the router and the other end to the RJ-45 port on the back of the computer. Our computer is now connected to our local network and to the Internet.

6.4.6 Configure a Wireless Infrastructure (Simulation) Scenario

You recently signed up for cable internet access in your home office. The cable company has come and installed the line into your office. You need to configure the network so that wired and wireless computers can share the cable internet connection. In your office, all connectors on the wall plate are for WAN connections only; you do not have LAN

connections inside the office.

In this lab, your task is to connect the components to make the internet connection.

• Add the cable modem to the Workspace. o Use a coaxial cable to connect the modem to the WAN connection.


o Plug in the modem.


o Use an RJ-45 cable to connect the yellow internet port on the router to the cable modem.


o Use another RJ-45 cable to connect the computer to one of the blue LAN ports on the wireless router.


o Plug in the wireless router.


• Add the wireless router to the Workspace.


In this lab, you will only configure the hardware to make the internet connection. You will not complete operating system tasks, configure the cable modem, or configure the wireless router.

Explanation

In this lab. your task is to connect the components to make the internet connection.

• Add the cable modem to the Workspace. o Use a coaxial cable to connect the modem to the WAN connection.


o Plug in the modem.


• Add the wireless router to the Workspace. o Use an RJ-45 cable to connect the yellow internet port on the router to the cable modem.


o Use another RJ-45 cable to connect the computer to one of the blue LAN ports on the wireless router.


o Plug in the wireless router.


Complete this lab as follows:

1. Connect the modem to the WAN connection as follows: a. On the Shelf, expand Routers .


b. Drag the cable modem from the Shelf to the Workspace.


c. Above the cable modem, select Back to switch to the back view of the cable modem.


d. On the Shelf, expand Cables .


e. Select the coaxial cable .


f. Under Selected Component, drag a Coaxial Type F Connector to the port on the cable modem.

g. Under Selected Component, drag the other Coaxial Type F Connector to the port on the wall plate.


2. Connect the wireless router to the cable modem as follows: a. On the Shelf, expand Routers .


b. Drag the wireless router from the Shelf to the Workspace.


c. Above the wireless router, select Back to switch to the back view of the wireless router.


d. On the Shelf, expand Cables .


e. Select the Cat6a cable .


f. Under Selected Component, drag a RJ45 Connector to the Internet port on the wireless router.


g. Under Selected Component, drag the other RJ45 Connector to the port on the cable modem.


3. Connect the computer to the wireless router as follows: a. Above the computer, select Back to switch to the back view of the computer.


b. On the Shelf, select the Cat6a cable .


c. Under Selected Component, drag a RJ45 Connector to the network port on the computer.


d. Under Selected Component, drag the other RJ45 Connector to a LAN port on the wireless router.


4. Plug in the cable modem as follows: a. On the Shelf, select the Power Adapter .


b. Under Selected Component, drag the DC Power Connector to the port on the cable modem.


c. Under Selected Component, drag the AC Power Adapter to the power outlet.


5. Plug in the wireless router as follows: a. On the Shelf, select the Power Adapter .


b. Under Selected Component, drag the DC Power Connector to the port on the wireless router.


c. Under Selected Component, drag the AC Power Adapter to the power outlet.


6.4.7 Cellular Technology

Cellular technology is an integral part of modern life. It allows people to communicate with ease across great distances. This technology depends on cellular networks that are supported by cell towers and satellites that broadcast signals all over the globe. The signals are picked up with cellular-enabled devices, such as smartphones, tablets, and some computers.

As the technology has advanced, more powerful networks have been created, making this kind of communication easier and faster.

Cell Tower


Cell tower.

Photo by Tony Stoddard on Unsplash What Is Cellular Technology?

Cellular technology gets its name from the many small, interconnected transmitters (cells) that it uses for communication. These connections are multiple access; multiple voice and data connections are placed into a single radio channel. This kind of communication started to become widespread in the early 1980s. Today, most of the planet has this technology.

In addition to allowing for mobile voice communication, modern cellular networks allow users to connect to the internet without a Wi-Fi or Ethernet connection. Users can choose plans that offer unlimited access or plans that offer a certain amount of mobile data each month.

If a person has a limited amount of data, it's usually preferable to use Wi-Fi when available. Using Wi-Fi to access the internet doesn't count against the monthly total of data. Using a hotspot, a cellular device can also provide access to a computer through its cellular connection. This is sometimes called tethering.

Advances in Cellular Technology

Over the years, new wireless standards have been developed that have increased the speed and method of data transmission. The first wireless networks were 1G (1st generation) wireless. The next upgrades to these networks were known as 2G, 3G, 4G, and G5. Each new network generation is incompatible with previous versions.

• 1G was an analog cellular network that became available around 1979. It was able to transmit only voice signals.


• The first 2G standard was known as the Global System for Mobile Communications (GSM). This generation introduced the first digital cellular networks. It was first launched in 1991 and is still used in many places. Key points are: o It provided only the transmission of voice signals.


o Unlike 1G, it allowed for data encryption.


o GSM was used in the United States by AT&T and T-Mobile and was also used internationally.


o A key feature of GSM is the SIM (Subscriber Identity Module) card.


o SIM cards are still commonly used to store the user subscription and phone boot information. This card can then be moved from mobile device to mobile device.


o Another 2G format is the Interim Standard 95 (IS-95), also known as cdmaOne. (CDMA stands for code division multiple access.) Unlike GSM, the mobile device is managed by the provider not the SIM.


o Evolved High Seed Packet Access (HSPA+) - A mobile network technology that offers upload data speeds up to 42 Mbps and download speeds between 3.5-14 Mbps.


o CDMA2000/Evolution Data Optimized (EV-DO) - An evolution of the CDMA2000 (IS-2000) standard. It supports an upload speed of 1.8 Mbps and a download speed of 3.1 Mbps.


o Currently the average LTE download speed is about 13.5 Mbps but could reach up to 150 Mbps once provider's networks are improved.


o LTE Advanced (LTE-A) improves on LTE and can usually provide a download and upload speed of two to three times faster than LTE.

o Have lower latency, making them more responsive to commands.


o Can handle about one million devices per 1 square kilometer (about .4 square miles).


o Are bringing about the full potential of the Internet of Things (IoT), in which devices communicate seamlessly with each other in real time.


• In between 2G and 3G, is the General Packet Radio Services/Enhanced Data Rates for GSM Evolution (GPRS/EDGE). It is used on top of GMS and was a lead up to 3G. GPRS is packet-based, meaning that the data is broken up into small blocks and transmitted over various channels. GPRS supports a download speed of 114Kbps. EDGE is slightly faster than GPRS with a download speed over two-times faster at 384Kbps.


• 3G networks first appeared around 2001. They were the first networks that enabled a mobile broadband connection. This created cellular networks that had speeds from 200 KBps up to a few Mbps. This was a huge leap forward. 3G networks were developed using the following standards:


• 4G networks appeared around 2009 and provided even greater speeds of up to hundreds of megabits per second. It is based on the Long Term Evolution (LTE) standard; it is supported by both CDMA and GSM providers.


• 5G networks appeared around 2020 and provided even greater speeds (up to 20 GB at peak rates). 5G networks:


6.4.8 Manage Mobile Devices (Demo Video) Transcript:

In this lab, you need to configure an iPad to use SSL encryption for sending emails. Click Settings, then scroll down and click Accounts and passwords. Click Gmail, then click tlewis@gmail.com. Click advanced, then slide this button over to enable SSL.

Next, we'll connect this iPad to our Wi-Fi network. On the left, click Wi-Fi. Select CorpNet. Type the provided password. If you like, you can select the password from the instructions to copy it, then paste it into this field. When you're done, click Join.

6.4.9 Manage Mobile Devices (Simulation) Scenario

You are the IT administrator for a small corporate network. A new administrative assistant, Tyrell Lewis, uses an iPad to correspond with employees over email. On the device, his email settings are configured to communicate with an IMAP mail server over the unsecure port 143. Tyrell also needs to use the new password to connect to the wireless network named CorpNet.

In this lab, your task is to complete the following:

• Use the Accounts and Passwords option to go to Tyrell Lewis's email account settings and change the advanced configuration to Use SSL to securely communicate with the IMAP server over server port 993 .


• Connect Tyrell to the CorpNet access point through the Wi-Fi configuration using @CorpNetWeRSecure!& as the password.


Explanation

In this lab, your task is to complete the following:

• Use the Accounts and Passwords option to go to Tyrell Lewis's email account settings and change the advanced configuration to Use SSL to securely communicate with the IMAP server over server port 993 .


• Connect Tyrell to the CorpNet access point through the Wi-Fi configuration using @CorpNetWeRSecure!& as the

password.


Complete this lab as follows:

1. Set the email account to use SSL and the secure port 993 as follows: a. Select Settings .


b. From the left menu, select Accounts & Passwords .


c. Under Accounts & Passwords, select Gmail .


d. Under Gmail, select tlewis@gmail.com .


e. Select Advanced .


f. Slide the button to enable Use SSL .


g. Make sure the server port is set to 993 .


h. At the top, select Account .


i. Click Done .


2. Connect to CorpNet Wi-Fi as follows: a. From the left menu, select Wi-Fi .


b. Select CorpNet .


c. In the Password field, enter @CorpNetWeRSecure!& as the password.


d. Select Join .


6.4.10 Virtual Private Networks

A virtual private network (VPN) is a tool that allows internet users more security and privacy. It uses a public internet connection to create a private network that shields the user's data from others. A VPN masks a user's IP address to make their actions untraceable.

How VPNs Work


A computer at a remote location connected through a VPN to a company's server at the main office all while blocking out hackers and snoopers. Illustration.

Using a VPN for Privacy

When you browse online, there are many sites that track your browsing and search history as a way to tailor advertising to you. With a VPN, you can keep this information private so that other sites can't use it. Not even your internet service provider (ISP) is able to track your browsing history when you use a VPN.

Without a VPN, other sites can use your IP to determine your physical location, such as what country or state you're located in. A VPN can mask your location, allowing users to access sites that are typically restricted to people in a certain country. Sometimes people use a VPN to stream media content that's only available in other countries.

Using a VPN for Security

If you're not using a secure internet connection, any information you transmit over that connection could potentially be

harvested by others. Hackers use information taken in this way to commit identity theft and other digital crimes. A VPN encrypts data sent over the internet so that it's not readable to anyone who tries to intercept it.

You can protect your data on your mobile devices as well so that you don't have to rely on public, unsecured Wi-Fi when you're not at home. This allows you to conduct sensitive business, such as banking transactions, wherever you are. It also allows you to connect securely to a company server to access information even when you're physically away from the office.

What Is Not Part of a VPN?

It's important to understand the limits of a VPN and what it can't do. Sometimes, a VPN can decrease your browsing speed. Certain online services block you if you use a VPN. In some countries, using a VPN isn't even legal.

Most websites that send sensitive information encrypt their data anyway, making it unnecessary to use a VPN (any website that starts with "https" is using this kind of encryption). Hacking is becoming more difficult than in times past as society catches up to technological advancements. If a VPN advertisement claims that it's granting you "military grade encryption," this is the same kind of encryption that these secure websites use and is nothing special.

Even if you hide your browsing data from your ISP using a VPN, you're not hiding it from the VPN company. You still need to be conscious of what they're doing with that data.

6.4.11 Configure a VPN Connection (Demo Video) Transcript:

In this lab, you need to set up a connection to a virtual private network. Right-click Start, then click Settings. Click Network and Internet, then on the left pane click VPN. Click Add a VPN connection. Set the VPN provider to Windows. Set the connection name to SalesVPN and the address to 198.10.20.12. Set the type to SSTP. Finally, uncheck this box to prevent Windows from remembering your sign-in info. Click Save.

Next, we'll configure the VPN security properties. Click Change adapter options. Right-click our new SalesVPN and select Properties. Go to the Security tab. Under Authentication, select use Extensible Authentication Protocol, then select Microsoft: Secured password from the dropdown. Click OK.

Finally, let's connect to the VPN. Select the VPN here, then click Connect. Log in with the provided username and password, then click OK. We are now connected to SalesVPN.

6.4.12 Configure a VPN Connection (Simulation) Scenario

You have been asked to add a VPN connection on a laptop computer in your organization. The sales team uses this computer to deliver sales presentations. They need to establish a secure connection to the company network while working on the road.

In this lab, your task is to configure and establish a VPN connection on the Office2-Lap using the following information:

• Add a VPN Connection as follows: o VPN provider: Windows (built-in)


o Connection name: SalesVPN


o Server name or address : 198.10.20.12


o VPN type: Secure Socket Tunneling Protocol (SSTP)


o Type of sign-in info: User name and password


o Don't allow Windows to remember authentication credentials


o VPN type: Secure Socket Tunneling Protocol (SSTP)


o Authentication: Microsoft: Secured password (EAP-MSCHAP v2) (encryption enabled)


o Username: VPNUser12


o Password: Ro@d24#!

• Set VPN security properties to meet the following requirements:


• Connect to the VPN as follows:


It isn't necessary to specify a domain when configuring this connection. Explanation

Complete this lab as follows:

1. Create the VPN connection. a. Right-click Start and then select Settings .


b. Select Network & Internet .


c. From the left pane, select VPN .


d. Select Add a VPN connection .


e. Configure the VPN connection as follows: . VPN provider: Windows (built-in)


. Connection name: SalesVPN


. Server name or address : 198.10.20.12


. VPN type: Secure Socket Tunneling Protocol (SSTP)


. Type of sign-in info: User name and password


. Remember my sign-in info: Clear


f. Select Save .


2. Configure the VPN security properties. a. Select Change adapter options .


b. Right-click SalesVPN and then select Properties .


c. Select the Security tab.


d. For Type of VPN , make sure Secure Socket Tunneling Protocol (SSTP) is selected.


e. Under Authentication, select Use Extensible Authentication Protocol (EAP) .


f. Use the drop-down to select, Microsoft: Secured password (EAP-MSCHAP v2) (encryption enabled) .


g. Select OK .


h. Close the Network Connections window.

3. Connect to the VPN. a. Select SalesVPN and then select Connect .


b. Enter the username VPNUser12 .


c. Enter the password Ro@d24#! .


d. Select OK .


e. Notice that you are now connected to SalesVPN.


6.4.13 Section Quiz (Section Quiz) q_itf2_isp_01

Which network type uses a coaxial cable to receive its signal? Answers:

• Satellite


• Fiber-optic


• Cellular


• *Cable


Explanation:

Cable connections require a cable modem to receive the signal from a coaxial cable and then convert it for use on a digital data network. This typically happens over copper Ethernet cables.

Fiber networks use fiber-optic cables to send signals with light instead of electricity.

Phones connect to the nearest cellular base station with radio signals. This station is usually a tall tower built to emit these signals.

By aligning a satellite dish to an orbital satellite hovering above the equator, you can get an internet connection nearly anywhere in the world.

q_itf_isp_ap

What precaution should you always take when using a public access point? Answers:

• Use a strong password when accessing websites.


• Don't perform secure tasks, such as online banking.


• *Ensure sites are using HTTPS.


• You should never use public access points.


Explanation:

When accessing public access points, you should always make sure any website you visit is using HTTPS. This helps prevent on-path attacks and malicious website pop-ups.

Using a strong password will not prevent on-path attacks or other attacks that can be performed on a public access point.

While it is not advised to perform secure tasks (such as online banking) while on a public network, sometimes there is no other option.

Completely avoiding public access points is not a realistic expectation in today's world. q_itf_isp_catv

Which DOCSIS version introduced support for download speeds of up to 1.2 Gbps? Answers:

• 1.0


• 2.0


• *3.0


• 3.1


Explanation:

The standard used for CATV are set by the Data Over Cable Service Interface Specifications (DOCSIS). DOCSIS has several specifications, such as DOCSIS 1.0, 2.0, 3.0, and DOCSIS 3.1. Each version provides more features and better download

speeds. For example, version 3.0 supports about 1.2 Gbps download speeds, while version 3.1 can support up to 10 Gbps download speeds.

q_itf_isp_cellular

Which of the following is a drawback to cellular internet? Answers:

• Expensive


• Slow speeds


• *Limited data


• Limited availability


Explanation:

Unlike other connection types, cellular data is likely to be rate limited. Instead of paying a monthly fee for as much data as you want, cellular providers generally limit the amount of data you can download.

Cellular internet is typically not more expensive than other internet types. Cellular internet can support high speeds based on the technology being used. Cellular internet is widely available as long as towers are within range. q_itf_isp_dsl_01

Jason works out of his home using a Small Office Home Office (SOHO) network and is planning on moving to a new city in a few months. What is the MOST likely reason Jason would choose Digital Subscriber Line (DSL) over a fiber network in his next home?

Answers:

• *DSL is more likely to be available at his new home.


• DSL provides higher upload and download speeds.


• DSL cables provide better performance over longer distances.


• DSL does not interfere with voice calls.


Explanation:

Fiber networks are expensive to build, so it is much more likely that DSL would be available in Jason's new home. Fiber networks use fiber optic cables to send signals with light instead of electricity, providing much faster upload and download speeds than DSL.

Fiber optic cables perform much better over long distances and are not impacted by noise in the way that electrical signals over copper cable can be.

Both DSL and fiber networks do not interfere with voice calls. q_itf_isp_dsl_02

What do ADSL and VDSL have in common? Answers:

• Both are symmetric.


• *Both use phone wires to carry their signal.


• Both can support speeds of up to 1 Gbps.


• Both use fiber optic cables.


Explanation:

Both ADSL and VDSL carry their signals over the existing copper phone lines.

Neither ADSL or VDSL are symmetric. Both are asymmetric, which means the uplink speed is slower than the downlink speed.

Neither ADSL nor VDSL can support speeds of up to 1 Gbps.

VDSL has a fiber optic backbone and carries its signal over copper phone lines. ADSL does not use any fiber backbone. q_itf_isp_dsl_03

Which of the following is true of ADSL? Answers:

• *ADSL has asymmetric speeds.


• ADSL has symmetric speeds.


• ADSL has a fiber backbone.


• ADSL supports speeds of up to 100 Mbps.


Explanation:

Asymmetric DSL (ADSL) has asymmetric speeds, which means that the uplink speed is slower than the downlink speed. ADSL does not use a fiber optic backbone.

ADSL is not capable of supporting speeds of up to 100 Mbps q_itf_isp_facts_01

Which network type uses light pulses to transmit data? Answers:

• Satellite


• *Fiber optic


• Wireless


• Cable


Explanation:

Fiber optic networks transmit light pulses rather than electricity to communicate. Satellite networks use radio signals

sent to and received from a satellite. Cable networks use a cable TV connection and electric signals to send data. Wireless networks use radio waves for sending network data within a local area network.

q_itf_isp_facts_02

Which of the following is not an example of wireless networking communications? Answers:

• *DSL


• 802.11n


• Infrared


• Bluetooth


Explanation:

DSL or Digital Subscriber Line, is not a form of wireless networking communications. Rather, it is a form of high-speed WAN connection used to connect remote systems to the Internet. Wireless communications are those types of networking technologies that do not rely upon wires or cables to connect computers together in a networking relationship. 802.11n is the primary wireless standard used. 802.11-compliant networks employ communication signals of 2.4GHz or 5.7 GHz radio waves. Infrared and Bluetooth are other forms of wireless networking communications. q_itf_isp_facts_03

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Answers:

• Dial Up


• *Satellite


• ISDN


• Cable modem


• DSL


Explanation:

Satellite capability is available even in areas that do not have a local network infrastructure. Satellite requires a local portable transmitter with an antenna directed skywards to a satellite. Satellite service providers offer nearly 100% global network coverage by maintaining a series of satellites circling the earth in geosynchronous orbit. Dial Up, ISDN, and cable modem, require a local network infrastructure provided by either the telephone company or cable television company.

q_itf_isp_facts_04

Which of the following Internet technologies provides the FASTEST speeds? Answers:

• *Fiber optic


• Cable


• DSL


• Cellular

Fiber optic provides the greatest speed, as light is transmitted at the speed of light using lasers or LED light sources. Cable and DSL rely on a copper media to transmit electrical signals which are less than the speed of light.

Cellular uses wireless radio signals to transmit data which is typically rate limited by the provider. q_itf_isp_facts_05

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

Answers:

• *Satellite


• Fiber optic


• DSL


• Cable


Explanation:

Satellite communication technology uses a satellite dish to send and receive signals to and from an orbiting satellite. Satellite Internet does not use telephone lines, cable systems, or other wired networks.

Fiber optic, cable, and DSL (Digital Subscriber Line) connections are not options in this scenario because they require wired connections through an ISP.

q_itf_isp_satellite

Which of the following is a drawback to satellite internet? Answers:

• *High latency


• Limited availability


• Low latency


• Less security


Explanation:

The main downside to a satellite connection is latency. Because data has to travel to space and back, it can take a few seconds longer to exchange data. While this may not seem like much, it makes a big difference for real-time applications, like online gaming and video conferencing.

Satellite internet is widely available; this is one of the main advantages to satellite internet. Satellite internet is not less secure than other options.

q_itf2_cellular_01

Which cellular network type was the first to have gigabit-per-second speeds? Answers:

• 1G


• *4G


• 3G


• 2G


• 5G

4G networks appeared around 2009 and provided even greater speeds of up to hundreds of megabits per second and even gigabit-per-second speeds.

The other options came either before or after 4G. Those that came before did not have the same speed capabilities. 5G is currently being rolled out and is set to be a game-changer for the modern world.

q_itf2_cellular_02

Which cellular network type was the first kind of network to use encryption? Answers:

• 1G


• *2G


• 3G


• 4G


• 5G


Explanation:

The first 2G standard was known as GSM and introduced the first digital cellular networks while also using encryption. This technology was first launched in 1991 and is still used in many places today. 2G only provided for the transmission of voice signals.

q_itf2_cellular_03

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? Answers:

• 1G


• 2G


• *Mobile data


• DSL


Explanation:

In addition to allowing for mobile voice communication, modern cellular networks allow access to mobile data, which lets users connect to the internet without a Wi-Fi or Ethernet connection.

The 1G and 2G wireless standards only provided for the transmission of voice signals. DSL is an internet service type that uses standard phone lines.

q_itf2_vpns_01

Which of the following statements is true regarding a VPN? Answers:

• You can hide your browsing history from the VPN company.


• *A VPN masks a user's IP address in order to make their actions untraceable.


• With a VPN, other sites can use your IP address to determine your physical location.


• Sometimes a VPN can increase your browsing speed.


Explanation:

A virtual private network (VPN) masks a user's IP address in order to make their actions untraceable.

Even if you hide your browsing data from your ISP with a VPN, you are not hiding it from the VPN company. Without a VPN, other sites can use your IP address to determine your physical location, such as what country or state you are located in.

Sometimes a VPN can decrease your browsing speed.

6.5 Networking Protocols Section Introduction

As you study this section, keep the following questions in mind:

• When might it be better to use TCP? When might it be better to use UDP?


• Why is it important for computers to use communications protocols?


• What is the relationship between subnet masks, IP addresses, and the binary number system?


After finishing this section, you should be able to:

• Describe basic internet protocols, including TCP/IP, UDP, DNS, HTTP, FTP, and DHCP.


• Describe common email protocols, including SMTP, POP3, and IMAP.


• Identify common HTTP methods, such as GET, POST, and DELETE.


• Interpret common HTTP status codes.


• Describe how networking devices transmit data to the right location on a network.


• Use the ipconfig command to find the following information for a workstation: o IPv4 address


o Subnet mask


o Default gateway address


o DNS server address


o DHCP server address


• Configure the following IP version 4 TCP/IP settings for a workstation to connect to the local network and the internet:

o IP Address


o Subnet Mask


o Default Gateway


o DNS Server


Key terms for this section include the following: Term

Definition

Internet Protocol (IP)

The principal communications protocol in the internet protocol suite that is used to route information over the Internet.


Transmission Control Protocol (TCP)

An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.


User Datagram Protocol (UDP)

An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn't verify that the packets were correctly received.


Domain Name System (DNS)

A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses.


Hypertext Transfer Protocol (HTTP)

A protocol that governs the transfer of web content between computers.


Hypertext Transfer Protocol Secure (HTTPS)

A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.


Simple Mail Transfer Protocol (SMTP) A protocol used to send email.


Post Office Protocol 3 (POP3)

A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.


Internet Message Access Protocol (IMAP)

A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client.


HTTP Method

A command that tells the server what the user wants to do. The most common methods are POST, GET, PATCH, and DELETE. These methods are used for CRUD operations which stand for Create, Read, Update, and Delete.


Dynamic Host Configuration Protocol (DHCP)

A network management protocol that assigns IP addresses on a network. It is part of the larger set of built-in networking protocols known as TCP/IP.


Subnetting

Dividing a network into smaller subnets.


Subnet Mask

A value given to an address in a subnetted network that tells a computer which numbers are part of the network or subnet address and which are part of the host address.


6.5.1 Internet Protocols (Lesson Video) Transcript:

The Internet is a huge, global system that connects computer networks from all over the world. With so many different networks communicating with each other, it's important that they all follow the same set of rules, or protocols.

Collectively, these protocols are called the Internet Protocol Suite, and they make it possible for millions of individual networks to send each other information.

The foundational protocol for the Internet is IP, which stands for Internet Protocol. IP is a routing protocol, which means it decides which route information should take through the Internet to get to its destination. When you send a file over the internet, your computer divides it into small pieces. Then, it adds a header to each piece that says where it came from and where it's supposed to go. The data payload together with its header is called a packet. The packets are routed through the Internet to their destination, which is determined by the IP header. The receiving computer reads the information in the header, removes it, and uses the rest of the packet to rebuild the file.

Another vital protocol is TCP, or Transmission Control Protocol. One of TCP's jobs is to make sure files are downloaded completely and correctly. In addition to the IP header, TCP adds its own header to each packet, which contains a unique number. Sometimes, data traveling through a network becomes corrupted by electrical interference or faulty wires. With TCP, every time your computer gets a packet, it sends a signal back to the server to acknowledge that the packet was received correctly. If the server doesn't get the acknowledgement signal, it sends that packet again. That way, both the computer and the server know when the entire file has been successfully downloaded. TCP is so important to the Internet that the Internet Protocol Suite is often abbreviated as TCP/IP.

TCP is the best protocol to use when a download needs to be perfect. Computer programs, emails, and webpages are all downloaded using TCP. However, since each packet needs to be acknowledged, TCP doubles the amount of traffic on the wire, which makes it too slow for some applications, including this streamed video you're watching right now. In cases like this, where speed is more important than accuracy, computers use the User Datagram Protocol, or UDP.

Like TCP, UDP adds header information to each packet. Unlike TCP, though, the destination computer doesn't acknowledge when it's received a packet. That frees up space on the wire for the server to send packets much faster than it could with TCP. However, every once in a while a packet will show up corrupted or not arrive at all. That's why streamed videos sometimes look a little bit glitchy. It's worth dropping a few packets to gain the speed necessary to stream video.

The next protocol we'll talk about is DNS, or the Domain Name System. Every website on the Internet has a unique address that the Internet Protocol uses to identify it, called an IP address. For example, the IP address for the google.com is 216.58.216.142. If we type that number into a web browser, it'll take us to the Google home page. However, imagine having to type 216.58.216.142 every time you wanted to do a Google search. DNS is a service that maps domain names, like testout.com or google.com, to IP addresses. When you type a URL like testout.com into your browser, your computer sends a request to a DNS server asking for the website's IP address. The DNS server looks it up, then sends it back to your computer.

You've probably seen that most web addresses start with the letters HTTP. This stands for Hypertext Transfer Protocol and is used for accessing pages of the World Wide Web. Hypertext documents contain text that links directly to other documents without having to navigate through a file directory. The most common kind of hypertext documents are webpages, which are accessed using a web browser. When you visit a website, your computer first gets that site's IP address from DNS, as we saw earlier. Then, it sends an HTTP request to the server at that IP address, which asks for its hypertext page. The server sends back the page, and it's displayed on the browser.

One of the biggest problems with HTTP is that it sends information in plain text. That means, if a cybercriminal intercepts a transmission, they'll be able to read all the information, including sensitive information like credit card numbers and physical addresses. That's why many websites use HTTPS. The S stands for the SSL protocol, or Secure Sockets Layer. Just like HTTP, HTTPS requests and transmits hypertext documents between a server and a computer. This is combined with SSL, which encrypts data that travels along the link. If someone intercepts the transmission, they won't be

able to understand any of the data because it's encrypted. HTTPS is vital for sending confidential information over the web.

In this video, we've taken a first look at the TCP/IP suite. We talked about IP, TCP, UDP, DNS, HTTP, and HTTPS. These protocols, along with many others, make it so a diverse group of networks can share information with each other, which is foundational to the Internet.

6.5.2 Email Protocols (Lesson Video) Transcript:

The TCP/IP suite has three protocols that deal with sending and receiving email. Let's take a short look at each one. The first protocol is SMTP, or Simple Mail Transfer Protocol. SMTP's job is to send email. When you send a message, SMTP routes it through the Internet to its destination mail server. SMTP is used by all email systems that use the Internet.

The next two protocols are used to receive email, and mail clients will use either one or the other. The first is Post Office Protocol 3, or POP3. When an email client uses POP3, it grabs messages from the remote server, downloads them to the local client, then deletes them from the server.

A much more common receiving protocol is IMAP, or Internet Message Access Protocol. With IMAP, email messages stay saved on the remote mail server. This way, people can access their emails from multiple devices, such as a home computer, a work laptop, and a smartphone.

When configuring an email account on your computer or smartphone, you typically need to know the host names of both the incoming and outgoing mail servers. For example, if you want to check your Gmail messages using a different mail client like Microsoft Outlook, you would likely enter imap.gmail.com as the incoming mail server and smtp.gmail.com as the outgoing mail server.

In this video, we looked at three Internet email protocols: SMTP, POP3, and IMAP.

6.5.3 Internet Protocol Facts

The internet is a system that connects computer networks from all over the world. With so many networks communicating with each other, it's important that they all follow the same set of rules, or protocols. Collectively, the protocols used for the internet are called the Internet Protocol Suite. Transmission Control Protocol/Internet Protocol (TCP/IP) is the primary protocol. The protocols make it possible for millions of individual networks to send information each other.

The history of TCP/IP started with the government's Department of Defense (DOD) in the late 1970's. Key points are:

• The DOD designed the set of networking protocols that would allow two or more computers to communicate.


• These protocols were designed using a packet switching network, meaning that the data could be broken up in smaller chunks called packets.


• These packets could then take any path possible to the destination network.


• Once they were received by at the destination, the packets were reassembled to create the complete data package.


• This was possible because each packet had a source and destination address. With TCP, they also included a sequence number so the data could be put back in the correct order, if the packets arrived out of sequence.


• If a packet failed to arrive, the destination computer could request that the missing packet be resent.


• When a packet needs to be forwarded from network to network, a device called a router is used to forward the packets.


• As time went on, this experiment turned into the robust TCP/IP protocol we use today.


TCP/IP

To help understand the functions of a networking system a conceptual framework known as the Open Systems Interconnection Mode (OSI Model) is used. This model is a theoretical way of classifying and talking about the complex process of sending data on a network.

However, to better understand how TCP/IP functions, there is also a TCP/IP model. The TCP/IP model focuses specifically on the functions in the Internet layer and the Transport layer. All other functions of the traditional OSI model are encompassed in the first and fourth layers.

OSI and TCP/IP models compared.

The following table compares the functions performed at each TCP/IP model layer. Table 1: TCP/IP Model

LAYER DESCRIPTION


Application

The Application layer contains high-level protocols used by processes (applications) running on a host for network communications. The Application layer integrates network functionality into the host operating system and enables

network services. The Application layer does not include specific applications that provide services, but rather provides the capability for services to operate on the network.


Transport

The Transport layer is responsible for error checking and reliable delivery. In the transport layer, each application protocol is identified by a port number. Protocols that are associated with the Transport layer include:

• Transport Control Protocol (TCP) - Adds a header to each IP packet. The TCP header helps the receiving computer to assemble the packets into the correct configuration once the entire file is downloaded. The headers also allow the sending and receiving computers to verify with each other that each packet was received correctly.


• User Datagram Protocol (UDP) - Is generally used when speed in transmission is more important than accuracy, such as streaming audio or video. Like TCP, UDP adds a header to each packet. However, unlike TCP, the sending computer


doesn't verify that the packets were correctly received. This makes transmissions happen much faster but allows transmission errors.


Internet

The Internet layer is responsible for forwarding packets through multiple networks. This process is called routing and is done by encapsulating the packets into internet datagrams. The Internet layer manages host addressing and routing decisions to identify how packets traverse networks. Protocols that reside at the Internet layer include:

• Internet Protocol (IP) - As one of the main protocols in the TCP/IP suite, the IP protocol uses logically-assigned IP addresses to uniquely identify networks and network hosts. This helps in the routing of the packets between each host and network.


• Address Resolution Protocol (ARP) - This protocol links an IP address to a host's physicals address (MAC address). For example, when you use a browser to access a site, you use the IP address (a number not too difficult to remember or use). However, to communicate with the host, the process needs to know the MAC address (hardware address) found on the interface card or device. ARP discovers the MAC address for you.


• Internet Control Message Protocol (ICMP) - This protocol supports the TCP/IP suite. It's main job is to send error messages and other operational information to let the systems know if the data was transferred successfully or if there was an error during transmission. It is used by network devices, including routers.


• Internet Group Management Protocol (IGMP) - This protocol is used by hosts and adjacent routers to establish multicast group memberships. IGMP is an integral part of IP multicast and allows the network to direct multicast transmissions only to hosts that have requested them.


Link/Network Interface

The Link layer is responsible for describing the physical layout of the network and how messages are electrically transmitted. It is used to move information between hosts by controlling how individual bits are transmitted and received on the network medium. The Link layer converts the data to be transmitted into frames by adding a Link layer header that includes physical device addressing information. Each frame processed by the Link layer includes the source MAC address and the destination MAC address. The Link layer then converts the frames into bits for transmission across the network media. The Link layer corresponds to the functions of the Physical and Data Link layers of the OSI model.

The following tables describe a few additional terms related to internet and email protocols. Table 2: Other Internet Protocols

TERM DESCRIPTION


DNS

Domain Name System (DNS) - Matches unique IP addresses with easy-to-read URLs. When you navigate to a website, your computer asks a DNS server to provide the IP address that corresponds to the URL you want to visit. DNS returns the correct IP address, which is then connected using the IP protocol.


HTTP

The Hypertext Transfer Protocol (HTTP) - Is used to identify resources and transfer hypertext pages on the World Wide Web.


HTTPS

Hypertext Transfer Protocol Secure (HTTPS) - Provides secure transfer over the internet. One of the biggest downsides of HTTP is that it transmits data as plain text. An attacker could intercept the signal during transmission and read the sensitive information it contains. When websites need to send or receive data securely, they use HTTPS, which combines HTTP with the Secure Sockets Layer (SSL) protocol. SSL encrypts data so unauthorized parties can't understand the data even if they manage to intercept it.


Email Protocols

The TCP/IP suite has three protocols that deal with sending and receiving email. The following table describes these protocols as well as some related services:

Table 3: Email Protocols and Services TERM

DESCRIPTION


SMTP

Simple Mail Transfer Protocol (SMTP) - Is used to send email. When you send a message, SMTP routes it through the internet to its destination mail server. SMTP is used by all email systems that use the internet.


POP3

Post Office Protocol 3 (POP3) - Is one of two protocols used to receive email. When an email client uses POP3, it grabs messages from the remote server, downloads them to the local client, then deletes them from the server.


IMAP

Internet Message Access Protocol (IMAP) - Is a much more common receiving protocol. With IMAP, email messages stay saved on the remote mail server. This way, people can access their emails from multiple devices, such as a home computer, a work laptop, and a smartphone.


Configuring email accounts

When configuring an email account on your computer or smartphone, you typically need to know the host names of both the incoming and outgoing mail servers. For example, if you want to check your Gmail messages using a different mail client like Microsoft Outlook, you probably enter imap.gmail.com as the incoming mail server and smtp.gmail.com as the outgoing mail server.


Email filtering

Most email clients include a feature that automatically filters out junkmail. While email filtering can be implemented by each user, it can also be enabled in incoming mail services to reduce spam and other unwanted email by blocking email based on the sender address or by content.


Domain Name System (DNS)

In addition to TCP/IP, it's important to understand the domain name system protocol (DNS). Every website on the internet has a unique address that the Internet Protocol uses to identify it. It is called an IP address. For example, the IP address for the google.com is 74.125.142.105. If you type that number into a web browser, it will take you to the Google home page. However, imagine having to type 74.125.142.105 every time you wanted to do a Google search.

DNS is a service that maps, or resolves, domain names like testout.com or google.com to their IP addresses. When you type a URL like testout.com into your browser, your computer sends a request to a DNS server asking for the website's IP address. The DNS server looks it up, then sends it back to your computer. This process is known as a DNS query.

DNS is known as a hierarchical system, meaning that several DNS servers are used to locate the desired IP address, since no one DNS server holds all the possible DNS records. These DNS servers are organized in an inverted hierarchical tree structure. At the top of the structure is the root. Under the root are several top-level domains, such as .com, .edu. org.

Next comes the sub-domains that are typically assigned to companies (for profit and non-profit), such as .testout,

.microsoft, .amazon, and .walmart.

As already mentioned, you are probably familiar with domain name like TestOut.com to access your favorite sites. These domain names are also called a hostname. Hostnames can contain up to 256 alphanumeric characters. They can also contain hyphens. The absolute domain name, also known as the fully qualified domain name (FQDN), specifies the exact location of the domain in the hierarchical tree. For example, myhost located in the parent domain testout.com has the fully qualified domain name of myhost.testout.com.

6.5.4 HTTP Methods and Status Codes

HyperText Transfer Protocol, or HTTP, is a set of rules computers use to send and receive files and webpages over the internet. Whenever you visit a website, your computer sends an HTTP request to the website's server. The server responds to the request by sending the appropriate file back to your computer, which is loaded into the web browser.

HTTP can also request that a server create, change, or delete information.

This lesson will discuss two attributes that are part of every HTTP request: methods and status codes. These attributes are generally behind the scenes, meaning that the user doesn't directly see them.

HTTP Methods

An HTTP method is a word that tells the server what the user wants to do. The most common ones are POST, GET, PATCH, and DELETE. These methods are used for CRUD operations—Create, Read, Update, and Delete.

Table 1: HTTP Methods Method

Operation Description


POST

Create

The POST method requests that a web server accept data from the user, usually to store it in a database. POST is used to submit completed web forms, including social media posts and comments.


GET

Read

The GET method is used to retrieve data from a web server. Whenever you visit a website, your computer sends a GET request to the site's server.


PATCH

Update

A PATCH request tells the server to make a change to an existing resource, such as editing a social media comment.

DELETE

Delete

DELETE requests tell the server to delete the specified resource.


Status Codes

Every time a server gets an HTTP request, it responds with a status code. These status codes are all three digits long and are grouped into five categories:

Table 1: HTTP Status Codes Range

Category Description


100-199

Informational

Informational status codes are temporary responses that let the requesting computer know that the message has been received. They're almost always immediately followed by another status code.


6.5.5 DHCP

Dynamic Host Configuration Protocol (DHCP) is a network management protocol that handles assigning IP addresses on a network. It's part of the larger set of built-in networking software known as Transmission Control Protocol/Internet Protocol (TCP/IP).

Internet Protocol (IP) addresses identify each computer's location on the network and allow it to communicate with other computers on that same network. DHCP runs by a specific set of rules that acts the same on every computer. Every computer needs an IP address whenever it's online, which makes DHCP a very important concept to understand.

DHCP Diagram


DHCP server assigning IP addresses to three computers.

In order to understand what DHCP does, you should understand the two kinds of IP addresses—static and dynamic—and why each type is used.

Static IP Addresses

A static IP address is one that a user manually configures for a device instead of having it assigned by DHCP. The reason that it's called static is that it doesn't change in the way a dynamic IP address does. This is what you need if you want to give a device a fixed address that can be easily accessed in the future. Users often use static IP addresses for things like file servers, network printers, running a printer server, or using a remote access program.

Dynamic IP Addresses

A dynamic IP address is one that's handed out by DHCP. It's called dynamic because it can change from time to time. Dynamic IP addresses are used for most home networks because they're the most cost-effective way for internet service providers (ISPs) to assign IP addresses. Instead of always giving the same IP address to your home computer, DHCP pulls from a pool of IP addresses it has at its disposal. Periodically, DHCP can assign you a new IP address when the lease for the current one expires.

DHCP Servers

A DHCP server is a network server that uses DHCP to assign IP addresses and subnet masks. It's vital that every computer on a network have a unique IP address so conflicts don't arise. If a network didn't have a DHCP server, the network administrator would have to manually set up every client who wanted to join the network. This would be a cumbersome and inefficient process, especially if they were dealing with a large network.

When a network computer comes online, it sends a message to the DHCP server to request an IP address. The server then automatically offers to lease an IP addresses to network computers in the order that it receives them. The network computer accepts the lease offer and connects to the network.

6.5.6 Subnetting (Lesson Video)

Transcript:

Ethernet allows a maximum of 1024 hosts on a single network. This could be problematic for huge companies that want to run thousands of computers at the same time. To get around this problem, they divide their large network into smaller networks called subnets. In this video, we'll take a first look at subnetting and how it works.

Every IP address is made of two parts – the network address and the host address. The network address is like a street, and the host addresses are like the individual house numbers on that street. To know which numbers are part of which address, we need to look at a behind-the-scenes value called the subnet mask, which tells the computer which numbers are part of the network, or subnet, address, and which are part of the host address. In this example, we're using the default subnet mask. The network address is 192.168, and the host address is 6.2.

Suppose we want to make this subnet smaller. To do this, we need to change the subnet mask. Now, the network address is 192.168.6, and the host address is 2. With this subnet mask, there is room for 254 hosts with addresses from 1 all the way to 254.

You may be asking yourself, "Why 1 to 254? Why not 0 to 255?" Good question! The highest and lowest host addresses on a particular network are reserved for special purposes. The lowest address, 0, is called the "network identifier," which the computer uses to designate the network as a whole. The highest address, in this case 255, is called the "broadcast address." Any message sent to the broadcast address will be delivered to every single host on the subnet.

If we want, we can make an even smaller network, but first we'll have to look at how subnet masks really work. We usually talk about IP addresses using decimal numbers, but as far as the computer is concerned, everything is binary. In binary, subnet masks are always made of a group of ones followed by a group of zeroes. Because of this, we can use the first five bits of the last octet as part of the subnet mask. This leaves only three bits for individual hosts, which can be numbered from 001 up to 110. Remember –the lowest value is reserved for the network identifier, and the highest value is reserved for the broadcast address. Now, we can translate everything back into decimal. This is the subnet mask, this is a network address using that mask, and these are the host addresses available on the subnet.

In this video, we learned about subnetting, which is dividing a network into smaller subnets. We learned that subnet masks are used to distinguish between a network and host address. We also learned about two special addresses – the network identifier and the broadcast address.

6.5.7 Explore Network Configuration Information (Demo Video) Transcript:

In this lab, we'll use ipconfig to answer questions about our IP address and other network information. To start, launch Windows PowerShell. Type PowerShell into the search bar and press enter. In the PowerShell window, type ipconfig and press enter. This gives us our basic IP Configuration information. We can see our IPv6 address and our IPv4 address. We can also see our subnet mask. In this example, the first three octets form our network address, and the last octet is our host address. In other words, our network address is 192.168.0 and our host address is 35.

If we want more details, we can use ipconfig with the /all parameter. If we look at the Ethernet section, we can see that DHCP and autoconfiguration are enabled. This means when our computer connects to the network it will be given a dynamic IP address by DHCP instead of having its very own static IP address. We can also see two DNS servers. The first one is our primary DNS server. As you can see, it has the same network address as our local machine, which means it's on our local network. If this server doesn't know how to resolve an IP address, the computer will ask the secondary DNS server. This one has a different network address than ours, which means it's probably owned by our ISP.

6.5.8 Explore Network Configuration Information (Simulation) Scenario

At the command prompt, use the ipconfig command to find the answers to the following questions:

• What is the IPv4 address of the workstation?


• What is the subnet mask?


• What is the default gateway address?


Use the ipconfig /all command to find the answers to two more questions:

• What is the address of the first DNS server that the workstation will use for name resolution?


• How did the computer get its IP configuration information?

To open a command prompt on Windows 10, right-click Start and select Windows PowerShell . Explanation

In the lower-left corner of the window, right-click the Start button and select Windows PowerShell .

At the command prompt, type the ipconfig command and press Enter. The following information will be displayed:

• Autoconfiguration IPv4 Address: 192.168.0.35


• Subnet Mask: 255.255.255.0


• Default Gateway: 192.168.0.5


At the command prompt, type ipconfig /all and press Enter. The following additional information will be displayed:

• DNS Servers (first line): 192.168.0.11


• DHCP Server: 192.168.0.14


Because the DHCP Server line has a value, this computer got its configuration information from a DHCP server.


6.5.9 Configure TCP/IP Settings (Demo Video) Transcript:

In this lab, you need to configure a static IP address for your computer. Click the Network icon, then click Network & Internet settings. On the left pane, click Ethernet. Click Change adapter options. Right-click Ethernet 2 and select Properties. Select Internet Protocol Version 4, then click Properties.

Right now, this computer is set to get an IP address automatically. However, this requires a DHCP server, which this network doesn't have. Instead, we'll have to set up a static IP address manually. First, we'll type in the IP address. Next, we'll type in the subnet mask and the default gateway. The default gateway is where packets will be sent if they're addressed to a computer outside this network. From there, they'll be routed through the Internet to their destination.

Finally, let's set up a preferred DNS server. When we're done, click OK.

6.5.10 Configure TCP/IP Settings (Simulation) Scenario

The Ethernet 2 adapter in your computer is physically connected to the lab network using a wired connection, as shown in Exhibits. This adapter is currently configured to use DHCP for its IP address assignment. However, a DHCP server has not been implemented on the lab network, so you must assign a static IP address to this adapter.

In this lab, your task is to assign the static IPv4 addressing information to the Ethernet 2 adapter in your computer as follows:

• For the host IP address, use the last valid IP address within the subnet: 192.168.20.62 .


• For the subnet mask, use the same subnet mask configured on the router: 255.255.255.224 .


• Configure the default gateway with the following address: 192.168.20.33 .


• Configure the preferred DNS server address as: 198.12.11.2 .


Explanation

Complete this lab as follows:

1. Access the TCP/IPv4 properties for the Ethernet 2 connection. a. Right-click Start and select Network Connections .


b. From the left pane, select Ethernet .


c. Select Change adapter options .


d. Right-click Ethernet 2 and select Properties .

e. Select Internet Protocol Version 4 (TCP/IPv4) and select Properties .


2. Configure the TCP/IPv4 properties. a. Select Use the following IP address .


b. Configure the IP addresses and DNS server addresses as follows: . IP address: 192.168.20.62


. Subnet mask: 255.255.255.224


. Default gateway: 192.168.20.33


. Preferred DNS server: 198.12.11.2


c. Select OK .


d. Select Close .


6.5.11 Section Quiz (Section Quiz) q_itf_protocols_fqdn

Which of the following reflects the inverted hierarchical tree structure of Domain Name System (DNS) servers? Answers:

• Internet Message Access Protocol (IMAP)


• Dynamic Host Configuration Protocol (DHCP)


• *Fully qualified domain name (FQDN)


• HyperText Transfer Protocol (HTTP)


Explanation:

The absolute domain name, also known as the fully qualified domain name (FQDN), specifies a domain's exact location in the hierarchical tree. For example, the domain named myhost located in the parent domain testout.com has the fully qualified domain name of myhost.testout.com.

Internet Message Access Protocol (IMAP) is a common email receiving protocol. With IMAP, email messages stay saved on the remote mail server. However, IMAP does not reflect the structure of DNS servers.

Dynamic Host Configuration Protocol (DHCP) is a network management protocol that handles assigning IP addresses on a network. It does not reflect the structure of DNS servers.

HyperText Transfer Protocol (HTTP) is used to identify resources and transfer hypertext pages on the world wide web. It does not reflect the structure of DNS servers.

q_itf_protocols_internet

Which of the following TCP/IP (Transmission Control Protocol/Internet Protocol) layers is responsible for forwarding packets through multiple networks?

Answers:

• Application


• *Internet


• Transport


• Network Interface


Explanation:

The Internet layer is responsible for forwarding packets through multiple networks. This process is called routing.

The Application layer integrates network functionality into the host operating system and enables network services. It is not responsible for forwarding packets.

The Transport layer is responsible for error checking and reliable delivery. It is not responsible for forwarding packets. The Network Interface layer is responsible for describing the physical layout of the network and how messages are electrically transmitted. It is not responsible for forwarding packets.

q_itf_protocols_internet_facts_01

Match each protocol on the left to its description on the right. Answers:

• Internet Protocol


• TCP


• UDP


• DNS


• HTTP


• HTTPS


Explanation:

IP (Internet Protocol) divides files into packets and routes them through the Internet to their destination.

TCP (Transmission Control Protocol) verifies that each packet has been transmitted and received correctly and retransmits packets that become lost or corrupted.

UDP (User Datagram Protocol) transmits packets in a continuous stream but doesn't verify whether packets are received correctly.

DNS (Domain Name System) matches unique IP addresses with easy-to-read URLs. HTTP (Hypertext Transfer Protocol) transfers hypertext pages on the World Wide Web.

HTTPS (HTTP + Secure Sockets Layer) encrypts and transfers hypertext pages on the World Wide Web. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.5. q_itf_protocols_internet_facts_02

What is the name of the protocol suite used on the Internet? Answers:

• *TCP/IP


• UDP/IP


• HTTP


• HTTP/DNS

Explanation:

The suite of Internet protocols used by all networks on the Internet is known as TCP/IP. It is also known as the Internet Protocol Suite.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.5. q_itf_protocols_internet_facts_03

Which of the following refers to digital content that is delivered over the internet? Answers:

• *World wide web


• ISP


• Network


• TCP/IP suite


Explanation:

The world wide web (also called the web) refers to the digital content that is delivered over the internet, usually through a web browser.

Internet service providers (ISPs) manage an access point to the internet and charge customers for that access. They don't manage the digital content that is delivered.

A network refers to a collection of computing devices (and associated hardware) that can communicate with each other. Networks enable the transfer of data over the internet but do not refer to the digital content itself.

TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate internet communication, but it does not focus on the content itself.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.5. q_itf_protocols_internet_facts_04

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

Answers:

• *IMAP


• SMTP


• POP3


• NTP


Explanation:

IMAP allows a mail server to keep a copy of a user's messages on the server after they are downloaded to the mail client. A POP3 server is also used by a mail client to retrieve messages from a mail server, but it requires that the messages be deleted from the server after they have been downloaded. SMTP allows a user to send email to a server, but it can't be used to retrieve messages from the server. The NTP protocol synchronizes the clocks of all computers on a network. q_itf_protocols_internet_facts_05

What protocol is used to send email messages from a mail client to a mail server? Answers:

• *SMTP


• FTP


• SNMP

• POP3


• IMAP


Explanation:

SMTP sends email from a mail client to a mail server. FTP provides a generic method of transferring files. SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. POP3 and IMAP are both email protocols used by mail clients to retrieve email from a mail server; however, they can't be used to send mail from the client to the server. The Trivial File Transfer Protocol (TFTP) is used for network file transfers.

q_itf_protocols_internet_facts_06

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email.

Which of the following should be implemented? Answers:

• *Email filtering


• Antivirus


• Firewall


• Multifactor authentication


Explanation:

While email filtering can be implemented by each user, it can also be enabled in incoming mail services to reduce spam and other unwanted email by blocking email based on the sender address or by content.

Antivirus software can protect against computer viruses found in an email but is not used to filter email content. Firewalls are placed between the company network and the internet to filter network traffic at the IP level. Normally, they do not filter email based on content.

Multifactor authentication combines a strong password with at least one other form of authentication before granting access. It does not filter email.

q_itf_protocols_internet_facts_07

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.)

Answers:

• *SMTP


• *POP3


• WPA


• WEP


• *IMAP


• SSL


• HTTP


• DNS

Explanation:

The TCP/IP suite has three protocols that deal with sending and receiving email. These three protocols are SMTP, POP3, and IMAP.

The Domain Name System (DNS) matches unique IP addresses with easy-to-read URLs.

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer hypertext pages on the World Wide Web.

WPA (Wi-Fi Protected Access ) and WEP (Wired Equivalent Privacy) are security protocols that govern how data in a wireless network is secured by encryption.

SSL encrypts data so unauthorized parties can't understand the data even if they manage to intercept it. q_itf_protocols_internet_facts_08

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

Answers:

• *POP3


• IMAP


• SMTP


• HTTPS


Explanation:

Post Office Protocol 3 (POP3) is a protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.

IMAP is a protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client. SMTP is a protocol used to send email.

HTTPS is a protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.

q_itf_protocols_tcp

Which of the following internet protocols makes sure that data packets are assembled on the receiving end in the correct order so that a complete data package is delivered?

Answers:

• Internet Protocol (IP)


• *Transmission Control Protocol (TCP)


• Domain Name System (DNS)


• HyperText Transfer Protocol (HTTP)


Explanation:

Once they're received at the destination, data packets are reassembled in the correct order using TCP.

Internet Protocol (IP) is a set of rules that makes sure data packets arrive at the correct destination. It does not focus on assembling the packets in the correct order to deliver a complete data package.

DNS is a service that maps domain names (like testout.com or google.com) to IP addresses. It does not ensure that data packets are assembled in the correct order.

HyperText Transfer Protocol (HTTP) is used for accessing pages on the world wide web. It does not ensure that data packets are assembled in the correct order.

q_itf2_httpcodes_01

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive? Answers:

• Informational

• Success


• Redirection


• *Client error


• Server error


Explanation:

Every time a server gets an HTTP request, it responds with a status code. Most of the time this happens behind the scenes, so users don't see the code directly. These status codes are all three digits long and are grouped into five categories:

• 100-199 = Informational


• 200-299 = Success


• 300-399 = Redirection


• 400-499 = Client error


• 500-599 = Server error


q_itf2_dhcp_01

What is the biggest benefit to using a DHCP server in a large network? Answers:

• DHCP servers can assign MAC addresses.


• DHCP servers use DNS.


• *They save time for the network administrator.


• There is no benefit to using a DHCP server.


Explanation:

A Dynamic Host Configuration Protocol (DHCP) server is a network server that uses DHCP to assign IP addresses and subnet masks. If a network did not have a DHCP server, the network administrator would have to manually set up every client who wanted to join the network. This would be a cumbersome and inefficient process, especially if he or she were dealing with a large network. It is vital that every computer on a network have a unique IP address so that conflicts do not arise, and so utilizing DCHP is incredibly important in a network setting.

6.6 Application Delivery Section Introduction

As you study this section, keep the following questions in mind:

• How does software get from its source to your device?


• How is software delivery different now than it was twenty years ago?


• Why is it important to keep software up to date?


This section introduces you to application delivery methods, software licensing, and software installation. After finishing this section, you should be able to:

• Compare and contrast different methods of delivering applications to users.


• Describe various ways software applications can be designed for greater scalability and maintenance.


• Compare and contrast different software licensing models.


• Use various methods to install and use software applications.


• Install software patches and updates.


• Configure a Windows system for automatic updates.


Key terms for this section include the following:

Term Definition


Local Installation

The traditional method for delivering applications by installing them on individual desktop computer systems.


Network Hosting

A method of delivering applications by installing them on the local network.


Cloud Hosting

A method of delivering applications by hosting them in the cloud.


Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.


One Tier

An application architecture model where programs run as standalone applications on a single computer.


Two Tier

An application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository.


Three Tier

An application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database server.


n-Tier

An application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network.


Platform Compatibility

A concern with using enterprise software in a network with multiple computer platforms and operating systems.


Proprietary Software

Software that isn't owned but requires the purchase of a license to use the software.

Personal License

A software license given to home and small business customers that allows them to install the software on a limited number of systems.


Enterprise License

A software license, often called a volume license or a site license, that allows the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached.


Open Source Software

Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit.


Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.


Windows Update

A feature of the Windows operating system that keeps the system up to date.


6.6.1 Application Delivery Methods (Lesson Video) Transcript:

In the information age, software applications are essential tools for most business employees. IT administrators are responsible for installing these applications, maintaining the infrastructure for running them, and backing up files generated by users. In this video, we'll discuss three different ways to deliver applications: installing them locally, hosting them on a local network, and hosting them on the cloud.

The traditional method for delivering applications is to install them on individual desktop computer systems. Any user who wants to use the software needs a separate installation on their local hard drive. For example, a typical employee might need to install Microsoft Word, Excel, and PowerPoint; Adobe Photoshop; Google Chrome; and a number of other applications. Each of these applications needs to be maintained with security updates and bug fixes, and users need to take responsibility for backing up their documents in case their local system fails.

The main advantage of local installations is that they don't require a network or Internet connection. Users can continue to do their work when the network goes down. But local systems are time consuming to maintain and difficult to back up. And if employees need to work from another location, they either need to purchase and install a second copy of the application on another computer, or they need to bring their business laptop wherever they go.

One way to improve the local installation method is to allow users to save their documents and other files to a server on the local network. This makes it much easier for IT administrators to back up files. They simply schedule regular backups on the network server. Local networks can also be used to host applications, which are installed on the server and then accessed remotely from client workstations.

Network installations make it easier to maintain the software and regulate user access. But if the network is congested or goes down altogether, users can't do their work. And if an employee wants to work from home, they need to set up a Virtual Private Network, or VPN, connection, which lets them log into their work computer remotely.

The third option is to host applications and other services on the cloud. Cloud computing can include storage and processing hardware, application software, and network connectivity, all accessed over the Internet.

With the cloud hosting method, applications run on hardware provided in a data center or some other location on the Internet instead of on local devices. This is great because an employee can run the application from her computer at work – and when she goes home and needs to finish a project, she can just log into her home computer, connect to the cloud, run the very same application, and access the same data – because it's all being stored in the cloud, not on her local hard drive at work.

From a user's standpoint, the great thing about the cloud is its flexibility, the fact that you can use whatever device you want from wherever you are and have access to the resources you need without having to install and set everything up manually. Cloud computing is also very attractive to management and to business owners because clouds are usually set

up within a pay-as-you-go system. Users can request application services or resources on-demand and then just release those resources when they're done.

A related term associated with cloud hosting is Software as a Service, or SaaS. SaaS provides users with the applications they need to do their day-to-day work through the cloud. Here again, the advantage of SaaS is that you only pay for what you need. And you can experiment with new software without committing to it. You can try out an application on a rental basis, pay for the time you use it, and if you really like it, you can keep using it.

The main disadvantage of cloud hosting is that you need a reliable Internet connection. Some cloud subscriptions, such as Microsoft Office 365 and Adobe Creative Cloud, include locally installed versions of their apps. These allow users to work while offline, as along as they connect to the Internet every 30 days or so to verify their subscription.

In this video, we introduced the three most common application delivery methods used by businesses: local installations, network hosting, and cloud hosting. We discussed the advantages and disadvantages of each method.

6.6.2 Application Delivery Facts

In the information age, software applications are essential tools for most business employees. IT administrators are responsible for installing these applications, maintaining the infrastructure for running them, and backing up files generated by

users. The table below discusses three different ways to deliver applications: installing them locally, hosting them on a local network, and hosting them on the cloud.

Table 1: Application Delivery TERM

DESCRIPTION


Local Installations

The traditional method for delivering applications is to install them on individual desktop computer systems. Any user who wants to use the software needs a separate installation on their local hard drive. For example, a typical employee might need to install Microsoft Word, Excel, and PowerPoint; Adobe Photoshop; Google Chrome; and a number of other applications. Each of these applications needs to be maintained with security updates and bug fixes, and users need to take responsibility for backing up their documents in case their local system fails. The main advantage of local installations is that they don’t require a network or Internet connection. Users can continue to do their work when the network goes down. But local systems are time consuming to maintain and difficult to back up. And if employees need to work from another location, they either need to purchase and install a second copy of the application on another computer, or they need to bring their business laptop wherever they go.


Network Hosting

One way to improve the local installation method is to allow users to save their documents and other files to a server on the local network. This makes it much easier for IT administrators to back up files. They simply schedule regular backups on the network server. Local networks can also be used to host applications, which are installed on the server and then accessed remotely from client workstations. Network installations make it easier to maintain the software and regulate user access. But if the network is congested or goes down altogether, users can’t do their work. And if an employee wants to work from home, they need to set up a Virtual Private Network, or VPN, connection, which lets them log into their work computer remotely.


Cloud Hosting

A third option is to host applications and other services on the cloud. Cloud computing can include storage and processing hardware, application software, and network connectivity, all accessed over the Internet. With the cloud hosting method, applications run on hardware provided in a data center or some other location on the Internet instead of on local devices. This is great because an employee can run the application from her computer at work – and when she goes home and needs to finish a project, she can just log into her home computer, connect to the cloud, run the very same application, and access the same data – because it’s all being stored in the cloud, not on her local hard drive at work.

From a user's standpoint, the great thing about the cloud is its flexibility – you can use whatever device you want from wherever you are and have access to the resources you need without having to install and set everything up manually. Cloud computing is also very attractive to management and to business owners because clouds are usually set up within a pay-as-you-go system. Users can request application services or resources on-demand and then just release those resources when they're done.

Software as a Service

A related term associated with cloud hosting is Software as a Service, or SaaS. SaaS provides users with the applications they need to do their day-to-day work through the cloud. Here again, the advantage of SaaS is that you only pay for what you need. And you can experiment with new software without committing to it. You can try out an application on a rental basis, pay for the time you use it, and if you really like it, you can keep using it.


The main disadvantage of cloud hosting is that you need a reliable Internet connection. Some cloud subscriptions, such as Microsoft Office 365 and Adobe Creative Cloud, include locally installed versions of their apps. These allow users to work while offline, as along as they connect to the Internet every 30 days or so to verify their subscription.


6.6.3 Application Architecture Models (Lesson Video) Transcript:

Some software applications are designed to run on a single computer. For example, you might install a standalone word processing program on your desktop computer at home. In this case, all data input, processing, and output occur within a single operating system on the same computing device.

In this video, we'll introduce more complex application architecture models that involve multiple components, or tiers, that operate on different computer systems on a network. Multiple tiers can make certain applications more scalable and easier to maintain, especially in a large business environment.

Many common programs run as standalone applications on a single computer. These are what we call single-tier, or one- tier, applications. They include traditional office productivity software and other programs that don't require access to a separate data source.

Business applications that store and retrieve data from a central repository typically operate more efficiently with two separate tiers: a client and a server. A common example would be a customer relationship management, or CRM, system. In this scenario, a sales employee runs the front-end application on her local computer, which requests customer data from the back-end database server. In other words, the graphical user interface and application logic resides on the client and the CRM database resides on the server.

The two-tier model makes a lot of sense when data is shared across an organization. The database server typically runs a database management system, such as Oracle or SQL Server, which keeps the data secure, organized, and up-to-date.

Some enterprise applications distribute components even further across a network with three or more tiers. The term "n- tier" implies that application developers can theoretically add as many tiers as they need to create the most efficient services and processes on a network.

A three-tier application would likely present the user interface on a client workstation, process data on an application server, and retrieve information from a database management system on a database server.

The advantage of having multiple tiers includes greater scalability and flexibility for applications. Enterprise application developers can more easily update and replace just one piece of the application without having to update the other tiers. Businesses that host application components on their own network servers are responsible for configuring and maintaining everything themselves. Another option is to use a web hosting or cloud hosting solution, where businesses pay a subscription for the services they use but rely on an outside company to update and maintain application components.

In this video, we discussed application architecture models. One-tier applications run on a single computer system and don't need a network. Two-tier applications separate program functionality between a client workstation and a database server. Three-tier applications add a middle layer that typically processes data on an application server. Complex enterprise applications can distribute components even further. The term "n-tier" means that applications can include as many layers as they need for efficient data processing and access control on a network.

6.6.4 Application Architecture Facts

Some software applications are designed to run on a single computer. However, there are more complex application architecture models that involve multiple components, or tiers, that operate on different computer systems on a network. Multiple tiers can make certain applications more scalable and easier to maintain, especially in a large business environment. The following table introduces four of these model types.

Table 1: Application Architecture Models MODEL

DESCRIPTION


One Tier

Many common programs run as standalone applications on a single computer. These are what we call single-tier, or one-tier, applications. They include traditional office productivity software and other programs that don’t require access to a separate data source.


Two Tier

Business applications that store and retrieve data from a central repository typically operate more efficiently with two separate tiers: a client and a server. A common example would be a customer relationship management, or CRM, system. In this scenario, a sales employee runs a front-end application on her local computer, which requests customer data from the back-end database server. In other words, the graphical user interface and application logic reside on the client and the CRM database resides on the server. The two-tier model makes a lot of sense when data is shared across an organization. The database server typically runs a database management system, such as Oracle or SQL Server, which keeps the data secure, organized, and up-to-date.


Three Tiers

A three-tier application would likely present the user interface on a client workstation, process data on an application server, and retrieve information from a database management system on a database server. The advantage of having multiple tiers includes greater scalability and flexibility for applications. Enterprise application developers can more easily update and replace just one piece of the application without having to update the other tiers. Businesses that host application components on their own network servers are responsible for configuring and maintaining everything themselves. Another option is to use a web hosting or cloud hosting solution, where businesses pay a subscription for the services they use but rely on an outside company to update and maintain application components.


n-Tier

The term “n-tier” implies that application developers can theoretically add as many tiers as they need to create the most efficient services and processes on a network.


6.6.5 Platforms and Licensing (Lesson Video) Transcript:

If you work as a system administrator for a large organization, software licensing becomes a little more complicated than decisions about what to install on your personal computer. You might need to worry about whether the software is compatible with multiple operating systems and devices, how many employees will be using the software at any one time, and whether it's more cost effective to go with a one-time purchase or a subscription service. You might also consider cutting costs with an open source solution. In this video, we'll explore the world of business software licensing. One of the most important features of enterprise software is whether it's compatible with multiple computer platforms and operating systems. If an organization chooses to accommodate different computer systems for its employees, it doesn't make sense to purchase single-platform software. For example, an application designed and programmed only for Windows 10 will typically not work on Linux or Mac OS.

Cross-platform software, on the other hand, is designed to work on multiple systems. It might be programmed in a platform-independent language that can be interpreted by different systems. Or the software could be compiled into different versions for different systems. Cross-platform compatibility does not necessarily mean the software will work on ALL systems. It could be limited to a few key hardware or software platforms.

Web applications are usually considered cross-platform software because they're designed to run within web browsers on different operating systems.

Now let's talk about software licensing. In today's IT environment, there are two general licensing models that you need to be familiar with: proprietary and open-source. The way these two models work is very different.

Let's start with proprietary software. The first thing to remember is that when you purchase this software, you don't

actually own it. You're just purchasing a license to USE the software. Because you're purchasing only a license and not the software itself, you're not allowed to access the software's source code and make any modifications.

Second, the license you purchase usually permits you to install the software only on a fixed number of computers. These Installation limits are commonly enforced by the software vendor using online software activation.

When purchasing proprietary software licenses, you can usually select from two general types of licenses: personal or enterprise.

Personal licenses are aimed at home and small business customers. Usually, they allow the software to be installed on a very limited number of systems, maybe one, two, or a maximum of three systems. A single-use license can only be installed on one computer.

Personal licenses may not be the best choice for a large organization that needs to purchase hundreds or possibly even thousands of licenses for a particular software title. Trying to purchase and manage this volume of personal licenses would be an administrative nightmare, as well as being really expensive.

To make things easier and more cost effective, many software vendors offer enterprise licenses, which are also called volume licenses or site licenses. Enterprise licenses allow the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached.

Another model is to limit the number of employees who can use the software at any one time. These concurrent licenses might be a better solution for software that is used infrequently by many employees.

Whatever licensing model an organization chooses, system administrators are responsible for monitoring and staying within the licensing agreement. Violating an agreement basically amounts to software piracy.

Now let's talk about open-source software. For many years, proprietary licensing was the only option for purchasing new software. Today, however, you can choose to use open-source software as an alternative.

Open-source software is usually freely distributed. That means you can download, install, and use the software without paying a licensing fee. This is similar to the idea of freeware or shareware, but with open source software, the source code is freely available to anybody who wants it. That means you could download the source code for an application that you like, modify it, recompile it, and then use the modified version of the software. In fact, you could even post it for other users to download and use as well. You just can't resell it for profit.

Organizations that release open-source products typically use a variety of alternative options for generating revenue. For example, they may rely on contributions. Some open-source projects will simply ask you to contribute financially so they can keep on working.

Other open-source projects may release a base version of their software that they give away for free but then charge you a fee for adding highly-desirable add-ons. In other words, they hook you with the free version and then charge you for the really good stuff.

Other open-source projects may provide support or training contracts. They may release their software for free, but then charge a fee for providing technical support.

Some open-source projects will partner with a commercial organization. In this situation, two versions of the application will probably be created. One version is proprietary and another is open-source. The proprietary version is typically used to finance the development of the free version.

Let's conclude by explaining software subscriptions. Since most software today can be installed and updated online, many software companies are moving toward a subscription model, often called Software as a Service (SaaS) or on- demand software. Users pay a monthly or annual fee to use the software and receive regular updates. The software is set up to automatically download and install updated versions, as long as the subscription is current. Individuals and businesses can save money up front by not having to purchase a perpetual software license, but they have to keep paying the subscription fee forever. Popular subscription-based apps include Microsoft Office 365 and Adobe Creative Cloud. In this video, we discussed cross-platform compatibility and software licensing for large organizations. We contrasted the proprietary software licensing model with the open-source software alternative. We concluded by explaining the increasingly popular software subscription model that replaces one-time purchases.

6.6.6 Platform and Licensing Facts

If you work as a system administrator for a large organization, software licensing becomes a little more complicated than decisions about what to install on your personal computer. You will need to determine:

• The software compatibility with multiple operating systems and devices.


• The number of employees using the software at any one time.


• The cost-effectiveness of a one-time purchase versus a subscription service.

• The cost-effectiveness of an open source solution.


This lesson explores the world of business software licensing. Table 1: Platforms and Licensing

Term Description


Platform compatibility

One of the most important features of enterprise software is whether it's compatible with multiple computer platforms and operating systems. If an organization chooses to accommodate different computer systems for its employees, it doesn't make sense to purchase single-platform software. For example, an application designed and programmed only for Windows 10 will typically not work on Linux or Mac OS. Cross-platform software, on the other hand, is designed to work on multiple systems. It might be programmed in a platform-independent language that can be interpreted by different systems. Or the software could be compiled into different versions for different systems. Cross-platform compatibility does not necessarily mean the software will work on all systems. It could be limited to a few key hardware or software platforms. Web applications are usually considered cross-platform software because they're designed to run within web browsers on different operating systems.


Proprietary software

Be aware that when you purchase proprietary software, you don't own it. You're just purchasing a license to use the software. Because you're purchasing only a license and not the software itself, you're not allowed to access the software's source code and make any modifications.


Term Description


The license you purchase usually permits you to install the software on only a fixed number of computers. These installation limits are commonly enforced by the software vendor using online software activation. When purchasing proprietary software licenses, you can usually select from two general types of licenses: personal or enterprise.


Personal license

Personal licenses are aimed at home and small business customers. Usually, they allow the software to be installed on a limited number of systems, maybe one, two, or a maximum of three systems. A single-use license can be installed on only one computer. Personal licenses are not the best choice for a large organization that needs to purchase hundreds or possibly even thousands of licenses for a particular software title. Trying to purchase and manage a large volume of personal licenses would be an administrative nightmare, as well as being expensive.


Enterprise license

To make things easier and more cost effective, many software vendors offer enterprise licenses (also called volume licenses or site licenses). Enterprise licenses allow the customer to install the software without restriction using the same activation code, typically until a specified maximum is reached. Another model is to limit the number of employees who can use the software at any one time. These concurrent licenses might be a better solution for software that is used infrequently by many employees. Whatever licensing model an organization chooses, system administrators are responsible for monitoring and staying within the licensing agreement. Violating an agreement is software piracy.


Open source software

Open-source software is usually freely distributed. That means you can download, install, and use the software without paying a licensing fee. This is similar to the idea of freeware or shareware, but with open source software, the source code is freely available to anybody who wants it. That means you can download the source code for an application,

modify it, recompile it, and then use the modified version of the software. In fact, you could even post it for other users to download and use as well. You just can't resell it for profit. Organizations that release open-source products typically use a variety of alternative options for generating revenue. For example, they may rely on contributions. Some open- source projects will ask you to contribute financially so they can keep working. Open-source projects may release a base version of their software that they give away for free and offer highly-desirable add-ons for a fee. Other open- source projects may provide support or training contracts. They may release their software for free but then charge a fee for providing technical support. Some open-source projects will partner with a commercial organization. In this situation, two versions of the application will probably be created. One version is proprietary and another is open-source. The proprietary version is typically used to finance the development of the free version.


Software Subscriptions

Since most software today can be installed and updated online, many software companies are moving toward a subscription model, often called Software as a Service (SaaS) or on-


Term Description


demand software. Users pay a monthly or annual fee to use the software and receive regular updates. The software is set up to automatically download and install updated versions as long as the subscription is current. Individuals and businesses can save money up front by not purchasing a perpetual software license, but they have to pay the subscription fee for as long as they want the software. Popular subscription-based apps include Microsoft Office 365 and Adobe Creative Cloud.


Licensing and Agreements

Regardless of the platform you use for your software, you will be required to accept some sort of licensing software agreement, usually referred to as the End-User License Agreement (EULA). In most cases (unless otherwise stated) you are allowed to install and license the software on only one computer. This is known as a single use license. Most software requires a license or product key to unlock the software. When used, the product key generates a unique product ID or serial number. This number is often required to obtain technical support. The key is obtained after legally purchasing the software and is usually a string of characters, sometimes printed on the package or electronically sent after an on-line purchase. When purchasing a license that can be used by multiple people for a corporation that may have hundreds of employees, software vendors let you purchase a group license often for an unlimited number of uses. This is also known as a concurrent license. Concurrent licenses can be applied via the employees' network connection and are referred to as Client Access Licenses (CAL). Keep in mind that most software agreements also allow the vendor to collect and store certain data from the use of the software. It is also important to remember that it is illegal to copy, use, or distribute unauthorized copies of a vendor's software. This software is known as pirated software. Not only is pirated software illegal, but it often can contain bugs and sometimes viruses. Although not required, most vendors also want you to register the software. This often gives you added benefits, such as being able to recover you license if lost or other types of services such as technical support.


6.6.7 Software Installation Best Practices (Lesson Video) Transcript:

Along with system software such as Windows or Mac OS, most new computer systems come with some application software preinstalled. However, you'll almost certainly want to install additional apps to meet your personal needs. And you'll need to keep your software updated with the latest file patches. In a business setting, system administrators are typically responsible for installing and updating software, either on individual computers or hosted on a local network. Installation options include using a DVD, downloading from a website, or purchasing from an online app store. In this video, we'll review some best practices for installing software.

To install an app from a DVD drive, simply insert the disc and follow the instructions on the screen. If the installation

does not begin automatically, you may need to adjust the AutoPlay settings on your computer.

Software vendors provide an end-user license agreement that dictates the specific terms of use. A single-use license can only be used on a specific computer. A site license or volume license can be used by businesses for multiple computers, typically until a maximum number has been reached. System administrators need to read license agreements carefully and then monitor software license use in their organization.

Most proprietary software is activated using a product key or a serial number. After entering the product key, file it away in a safe place. You'll need it for reinstalling the software if you get a new computer or need to reinstall the operating system.

Most installation programs include advanced options that let you change the default location for installing files. You may also want to customize the installation by excluding unnecessary components.

Before installing an app from the Internet, make sure the website or publisher is a legitimate, trusted source of software. Then download the installation file and scan it for viruses and other malware. Most antimalware programs like Windows Defender will scan the downloaded program automatically. When you're confident the installation file is safe, run it and follow the instructions on the screen.

Online app stores facilitate the purchase, downloading, and installation of apps. These include the Microsoft Store, which comes preinstalled with Windows, the Google Play Store, and the Apple App Store. Online app stores work hard to ensure that only trusted apps are available for download or purchase.

While desktop applications are installed and configured on individual computers, web applications are delivered to computers over the Internet through a web browser. Web apps typically do not require an installation, but they need a live Internet connection to function. Compared to desktop apps, web apps are often limited to a smaller subset of features.

When bugs and security vulnerabilities are discovered in software, responsible vendors publish file patches or updates to fix the problems. This includes application patches, driver updates, and operating system updates, which are called service packs on Windows.

The best place to find software updates is on Original Equipment Manufacturer, or OEM, websites such as Dell, HP, and Apple. Before downloading patches from a third-party website, make sure the site is legitimate.

If you install an app from a disc, it's probably out-of-date already. In this case, you'll want to download and install an updated version of the app from the vendor's website. Cloud-based software subscriptions such as Office 365 and Adobe Creative Cloud are configured to install updates automatically as they're available.

Web apps always include the latest software updates, since they reside on remote servers.

In addition to keeping the software on your computer system updated, you should also remove or uninstall software that you no longer need. You might find that an app has been installed on your system without your knowledge or that your system came preinstalled with software that you will never need or want.

In this video, we offered a few tips for installing software. We talked about product keys, license agreements, and advanced options. We also discussed tips for downloading software from the Internet, installing from an app store, using web apps, installing updates and patches, and removing unwanted or unnecessary software.

6.6.8 Software Installation Facts

While some application software comes preinstalled on a new computer along with the system software, you will want to install additional apps to meet your personal needs. Installation options include using a CD or DVD, downloading from a website, or purchasing from an online app store.

As you learn about each installation option, keep in mind that most installation programs include advanced options. Advanced options often let you change the default location for installing files as well the options to install. This means that you can customize the installation by excluding unnecessary components or installing additional components not installed by default.

However, before installing (or buying) an application, best practice is to always read the documentation that comes with the software. By reading the documentation, you will learn:

• Whether the application will work on your operating system.


• If the hardware in your computer is compatible with the application's requirements. For example, some applications require a 64-bit system.


• What licenses are required.


• If there are any known issues with the application.

The table below describes key concepts associated with installing, updating, and removing apps on a computer. Table 1: App Installation Concepts

CONCEPT DESCRIPTION


CD or DVD installation

To install an app from a CD or DVD drive, insert the disc and follow the instructions on the screen. If the installation does not begin automatically, you may need to adjust the AutoPlay settings on the computer. After installing an app from a disc, you may need to download and install an updated version of the app from the vendor's website.


Internet installation

Before installing an app from the internet, make sure the website or publisher is a trusted source of software. Then, download the installation file and scan it for viruses and other malware. Most anti-malware programs, such as Windows Defender, scans downloaded programs automatically. When you're confident the installation file is safe, run it and follow the instructions on the screen.


App store installation

Online app stores facilitate the purchase, downloading, and installation of apps. These include the Microsoft Store (comes preinstalled with Windows), the Google Play Store, and the Apple App Store. Online app stores work hard to ensure that only trusted apps are available for download or purchase.


Software subscription

Software has traditionally been sold as a perpetual license installed on a user's computer. However, the subscription model has become increasingly common in recent years. This model is often called Software as a Service (SaaS) or on- demand software. Users typically pay a monthly subscription fee to access the software over the internet. Advantages of this method include automatic software updates, lower up-front costs, and lower hardware requirements. Popular subscription-based apps include Microsoft Office 365 and Adobe Creative Cloud.


Web application

While desktop applications are installed and configured on individual computers, web applications are delivered to computers over the internet through a web browser. Web apps typically do not require an installation, but they need a live internet connection to function. Compared to desktop apps, web apps are often limited to a smaller subset of features. Since web apps reside on remote servers, they always include the latest software updates.


Legitimate software sources

There are many malware files that are disguised to look like legitimate software downloads. To ensure the software you download is from a reliable source, be sure you are accessing it from credible merchant, vendor app stores. or the Original Equipment Manufacturer (OEM). If you need software that is available only from a third-party source, research the source to look for accreditation. Immediately run an anti-malware scan when you download it to check for any malicious files.

Questions to confirm credibility of sources include:

• Does the website have a valid digital certificate?


• Is the download secure through HTTPS?


• Does the software have a vendor digital signature? Is that signature trusted by the computer?


• Have you checked with others on a forum for their experience with the download?

Updates and patches

When bugs and security vulnerabilities are discovered in software, responsible vendors publish file patches or updates to fix the problems. This includes application patches, driver updates, and operating system updates. These updates can be included in one update that can also include new features. These combined updates are called service packs on Windows. Remember to always perform a backup prior to downloading a service pack or system patch. The best place to find software updates is on OEM websites such as Dell, HP, and Apple. Before downloading patches from a third-party website, make sure the site is legitimate. If you install an app from a disc, it's probably already out-of-date. In this case, you'll want to download and install an updated version of the app from the vendor's website. Cloud-based software subscriptions such as Office 365 and Adobe Creative Cloud are configured to install updates automatically as they become available. Web apps always include the latest software updates since they reside on remote servers.


Anti-malware and disabled unused features

Besides patching and updating, it's important to install anti-virus/anti-malware software to protect your hardware, and systems. Anti-malware can protect your software from corruption from malware or viruses. Anti-malware software is especially important to update regularly. Yo protect against vulnerabilities, apply any patches as soon as you are notified. Another best practice to limit vulnerabilities is to disable features that are not in use, as well as, remove administrative privileges that are not necessary.


Software removal

In addition to keeping the software on your computer system updated, you should also remove or uninstall software that you no longer need. You might find that an app has been installed on your system without your knowledge or that your system came preinstalled with software that you will never need or want. Removing software and then reinstalling it can also be a way of troubleshooting software that has stopped working or is not working properly. If you are having an issue with software currently installed, you may be able to use a Repair option. If that fails or you want to remove the app for some other reason, you may need to do a clean uninstall.


A clean uninstall removes the files and settings associated with the application. This can sometimes be done with programs, such as Windows Settings app (or Control Panel), but often requires additional manual steps as specified by the app's developers.


6.6.9 Windows Update (Lesson Video) Transcript:

The Windows operating system, like any software, needs to be constantly updated. Some updates are necessary to fix errors or bugs in the operating system, some fix security problems that have been discovered, and some add functionality or features to the operating system.

Microsoft includes a feature called Windows Update to help keep your operating system up to date. Windows Update automatically identifies, downloads, and installs updates for the operating system for you. Windows Update can also be configured to provide updates for other Microsoft products, such as Microsoft Office. However, you cannot get updates from Windows Update for non-Microsoft applications installed on the system. In order to update these applications, you must go to the application vendor's website and manually check for updates.

You can manage updates using the Settings App. Go to Update & Security, Windows Update, Advanced options. Windows 10 is configured to install updates automatically. This feature is designed for your protection, since many updates are critical in addressing security flaws and preventing your computer from being attacked.

Notice here that we have the option to check for updates to other Microsoft products when updating Windows. If you work for a company large enough to have a systems administrator, these options here will most likely be controlled by your organization. These two numbers allow certain types of updates to be deferred. Because security improvements are often critical, they will typically be given a shorter deferral period, such as 7 days. Features updates might be allowed a longer deferral, such as 30 days.

The next section allows you to temporarily pause updates from being installed for up to 35 days. While you probably

won't need to select this option very often, you might want to use it if you have a slow Internet connection and you're working on a time-sensitive project that could be jeopardized by a problem caused by the update.

In this lesson, we've learned about Windows Update. Updates are provided to fix bugs, address security issues, or to add functionality to your operating system. Windows Update is configured by default to automatically download and install updates as they become available. Both urgent as well as optional updates are made available through Windows Update. You are allowed to defer some updates, but in most cases it's best to let Windows Update install them for you automatically when you're not using your computer.

6.6.10 Windows Update Facts

Like any software, the Windows operating system needs to be constantly updated. Some updates fix bugs in the operating system, while others fix security problems that have been discovered. Some updates even add functionality or features to the operating system.

Windows includes a feature called Windows Update to keep your operating system up to date. Windows Update automatically identifies, downloads, and installs operating system updates for you. Windows Update can also be configured to install updates for other Microsoft products, such as Microsoft Office.

Windows Update does not provide updates for non-Microsoft applications installed on the system. To update these applications, you must go to the vendor's website and manually check for updates.

You can manage updates by opening the Settings App and clicking Update & Security > Windows Update . Image 1: Configuring Windows Update in the Settings App


Advanced options in Windows Update. Screenshot. Table 1: Windows Update Management Tasks TASK

DESCRIPTION


Modify How Updates are Installed

When you first install Windows 10, Windows Update is configured by default to install updates automatically, which lets Windows choose a time when you're not using your computer. You can change this setting to let you specify a particular time, such as the middle of the night, for Windows to restart and install updates.

1. Open the Settings App and navigate to Update & Security > Windows Update .


2. Click Advanced options .


3. Under Choose how updates are installed , select one of the following: o Automatic (recommended) o Notify to schedule restart


4. If you want Windows Update to work with other Microsoft products, such as Microsoft Office, mark Give me updates for other Microsoft products when I update Windows.


5. If you want to defer some nonessential upgrades to the Windows operating system, mark Defer upgrades . With this option selected, security updates will always be installed, but you can delay certain upgrades.


Manually Check for Updates

Occasionally, you may need to check for new updates manually.

1. Open the Settings App and go to Update & Security > Windows Update .


2. Click Check for updates . Windows Update will look for any new updates that haven't been installed and add them to the list of pending updates.

Review Update History

Reviewing a list of installed updates can help you identify whether you are protected by critical security updates.

1. Open the Settings App and go to Update & Security > Windows Update > Advanced options .


2. Click View your update history . A list of all installed updates is displayed.


Updates may be installed in one of two ways:

• Some updates can be installed in the background while the system is running.


• Some updates require the system to be shut down and restarted for them to be applied. If you have chosen the automatic update option, updates will be automatically installed during a restart when you are not using the system.


6.6.11 Configure Windows Update (Demo Video) Transcript:

In this scenario, you need to configure a Windows computer to automatically search for and download software and security updates. You can do this by using Windows Update.

First, type the word Update into the search field, then click Check for Updates. On this screen, click Advanced Options. If we enable this option, Windows will search for updates for Microsoft products like Office along with updates to the operating system. Down here, we can choose to defer updates until later. Use these boxes to defer feature updates by 60 days and quality updates by 30 days. We can close this window when we're done.

6.6.12 Configure Windows Update (Simulation) Scenario

You need to customize how Windows Update checks for and installs updates on the ITAdmin desktop system in your organization.

In this lab, your task is to configure Windows Update to:

• Install updates for other Microsoft products when Windows is updated.


• Allow the installation of feature updates to be deferred 60 days.


• Allow quality updates to be deferred 30 days.


Explanation

Complete this lab as follows:

1. Configure the Windows Update settings. a. Right-click Start and then select Settings .


b. Select Update & security .


c. From the right pane, select Advanced options .


d. Under Update Options , turn on (slide the switch to on) Receive updates for other Microsoft products when you update Windows .


e. Under Choose when updates are installed , configure each options as follows: . A feature update includes new capabilities and improvements. It can be deferred for this many days: 60

. A quality update includes security improvements. It can be deferred for this many days: 30


f. Close the Settings window.


6.6.13 Section Quiz (Section Quiz) q_itf_appdelivery_facts_02

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Answers:

• *Local installation


• Network hosting


• Cloud hosting


• n-tier application


Explanation:

Local Installation is the traditional method for delivering applications by installing them on individual desktop or laptop computer systems. This delivery method does not require a network or internet connection.

Network Hosting is the method of delivering applications by installing them on the local network. Cloud Hosting is the method of delivering applications by hosting them in the cloud.

N-Tier is an application architecture model where application developers can add as many tiers as they need to create the most efficient services and processes on a network.

q_itf_appdelivery_local

Which of the following is the BEST example of using an application that is locally installed without network access? Answers:

• Writing a letter using the Google Docs application.


• *Creating a PowerPoint presentation for a team meeting.


• Viewing the latest email in your Outlook Inbox.


• Accessing a company folder through a VPN application.


Explanation:

When using PowerPoint locally on a device, you do not need access to the network to create a presentation. Google Docs is a cloud-based application and requires a network (Wi-Fi) connection.

While you can create email in your locally installed Outlook application without a network connection, to view the latest email, you need to connect to a network server hosting your email account.

Although a VPN utility can be installed and run locally on your computer, to access a company folder through the VPN requires that you have network access.

q_itf_appmodels_architect_facts_01

Which of the following Application Architecture Model tiers describes office productivity software?

Answers:

• *One Tier


• Two Tier


• Three Tier


• n-Tier


Explanation:

One Tier is an application architecture model where programs run as standalone applications on a single computer.

Two Tier is an application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository.

Three Tier is an application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database server.

n-Tier is an application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network.

q_itf_appmodels_tow-tier

Shelley is a marketing representative for an import/export business. Every time she meets with a customer, she uses a custom application installed on her laptop to update the customer account. The updated information is then sent to a company database server that's located in the corporate office.

Which of the following is the application architecture model that Shelley is using to update customer information? Answers:

• One-tier


• *Two-tier


• Three-tier


• n-Tier


Explanation:

Locally installed business applications that store and retrieve data from a central data repository represent a two-tier architecture model. In this case, Shelley is using a custom application installed locally on her laptop to access and edit information from a central database (located in the corporate office).

The one-tier architecture model runs all standalone applications locally on the same computer and does not require access to a separate data source (such as the database in the corporate office).

The three-tier architecture model would likely present the user interface on a client workstation, process data on an application server, and retrieve information from a database management system on a database server. However, in this example, all the processing is happening between the custom application and the database server. There is no need for an application server.

The n-Tier architecture model implies that application developers can theoretically add as many tiers as they need to create the most efficient services and processes on a network. However, Shelley is using a limited two-tier architecture that is not designed for adding additional tiers.

q_itf_platforms_advanced

A user is installing a business software package on a desktop computer and wants to change the default location for file installation so they can select specific features to install.

Which of the following is available in the software installer to give the user this capability? Answers:

• Software license agreement

• *Advanced options


• Add-ons and plug-ins


• Software subscription


Explanation:

Most installation programs include advanced options that let you change the default location for file installation as well as for including or excluding components and features.

When installing software, you're normally required to accept some sort of software licensing agreement. However, the agreement does not provide you the functionality to customize an installation.

Add-ons and plug-ins are normally associated with a web browser (not business software) and are added after an installation (not during the installation).

Software subscriptions allow users to pay an annual fee to access and use software already installed and running. They are not part of a software installation procedure.

q_itf_platforms_agreement

Which of the following contains information that allows the software vendor to collect and store data about software usage?

Answers:

• Software installation instructions


• Software documentation


• Software subscription


• *Software agreement


Explanation:

When you install software, you're usually required to accept some sort of licensing software agreement. This normally requires you to accept terms that allow the vendor to collect and store certain data from your software usage.

Software installation instructions are there to help you start installing a software program. However, they do not include software usage agreement terms.

Software documentation helps you effectively use software, but it does not include software usage agreement terms. A software subscription lets you pay a monthly or annual fee to use a software program and receive regular updates. However, it does not provide software usage agreement terms.

q_itf_platforms_eula

When you install software on your computer, you're usually required to accept some sort of software licensing agreement. What is this agreement normally called?

Answers:

• Personal license


• *End user license agreement (EULA)


• Enterprise license


• SaaS


Explanation:

Regardless of the platform you use for your software, when you install it, you'll normally be required to accept some sort of software licensing agreement. This is normally referred to as the end user license agreement (EULA).

Personal licenses are aimed at home and small business customers and usually allow the software to be installed on a

very limited number of devices. However, a personal license is not a software licensing agreement.

Many software vendors offer enterprise licenses, which are also called volume licenses or site licenses, that allow customers to install software without restriction using the same activation code (until a maximum number is reached). However, an enterprise license is not a software licensing agreement.

Software as a Subscription (SaaS) allows a user to pay a monthly or annual fee to use a software application and receive regular updates. However, a software subscription is not a software licensing agreement. q_itf_platforms_license_facts_01

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Answers:

• *Proprietary Software


• Open-source Software


• Microsoft Software


• Read-only Software


Explanation:

Proprietary Software is exclusively controlled by a company and cannot be used or modified without permission. Microsoft Office, Fortnite, and this course are all examples of proprietary software.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_platforms_license_facts_02

What is the term for software that anyone can use or modify for free? Answers:

• *Open-source Software


• Proprietary Software


• Linux Software


• Read-write Software


Explanation:

Open-source software can be used and modified by anybody for free. Examples of open-source software include Mozilla Firefox, Gimp, and Linux.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_platforms_license_facts_03

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality.

What is the name of this model? Answers:

• *Open Source


• Personal


• Enterprise


• Proprietary

• Persistent


Explanation:

Open Source software used to be exclusive to Linux and Unix operating systems. However, many Open Source applications are now available for Windows and Mac operating systems. Open Source licensing is very different from proprietary licensing:

• Open Source software is usually freely distributed. You can typically download, install, and use the software without paying a license fee.


• Some Open Source projects release a base version of their software for free but then charge a fee for highly desirable add-ons.


• Some Open Source projects release their software for free but then charge a fee for technical support.


• As with support contracts, some Open Source projects also provide training for a fee.


q_itf_platforms_license_facts_04

A developer wants to take existing code written by another person and add some features specific to their needs. Which of the following software licensing models allows them to make changes and publish their own version?

Answers:

• *Open-source


• Subscription


• Proprietary


• Software-as-a-Service (SaaS)


Explanation:

Open-source software is usually freely distributed. That means you can download, install, and use the software without paying a licensing fee. This is similar to the idea of freeware or shareware, but with open source software, the source code is freely available to anybody who wants it. That means you could download the source code for an application that you like, modify it, recompile it, and then use the modified version of the software. In fact, you could even post it for other users to download and use as well. You just can't resell it for profit.

Subscription, proprietary, and SaaS do not provide the ability to customize the code and typically explicitly forbid any modifications.

q_itf_platforms_product

When you install software, you're often asked for a product key. You may also be given a product ID. What is the difference between a product key and a product ID?

Answers:

• *A product key unlocks the software; a product ID is associated with software support.


• A product key is in your software's documentation; a product ID is in the software's license agreement.


• A product key is associated with software support; a product ID unlocks the software.


• A product key is normally displayed when the application starts; a product ID is printed on the software packaging.


Explanation:

Most software requires a license or product key in order to be unlocked. The product key then generates a product ID (or serial number), which is typically used to access software product support.

Product keys and product IDs are privately provided for you. They do not appear in the public software documentation or license agreement.

Product keys unlock software; product IDs are associated with software support.

A product key is provided privately (for security reasons) and is not displayed when the application starts. The product ID is generated from the product key and cannot be printed ahead of time on any packaging. q_itf_platforms_product_id

Which of the following helps you determine your level of software product technical support? Answers:

• Product key


• *Product ID


• Software agreement


• Enterprise license


Explanation:

Most software requires a license or product key in order to be unlocked. However, the product key does not indicate a level of product support.

The product ID is generated by the product key and is often used to obtain technical support (and indicate the support level).

A software agreement is associated with software usage terms (for both you and the manufacturer) but does not indicate a level of technical support.

An enterprise license is a convenient way of allowing a customer to install software without restriction (to a certain number of installations) using the same activation code. However, it is not associated with a level of technical support. q_itf_platforms_saas

A large financial advisory company is currently using an enterprise license to provide advisory software to all its offices. However, the software is now available as a SaaS (Software as a Service) subscription.

What would be a key advantage to using the SaaS subscription over an enterprise license? Answers:

• The SaaS subscription provides full technical support.


• The SaaS subscription provides a richer feature set.


• The SaaS subscription is a one-time fee for unlimited use.


• *The SaaS subscription is set up to automatically download and install full-feature upgrades.


Explanation:

A SaaS software subscription is set up to automatically download and install updated versions, as long as the subscription is current.

A SaaS software subscription does not guarantee full technical support.

A SaaS software subscription can provide some different software options but does not normally provide a richer feature set over software used with an enterprise license.

A SaaS software subscription normally requires that you renew the subscription annually. q_itf_platforms_shareware

Pamela decides to download and install a sound editor for free. However, once she installs and starts the program, a message is displayed indicating that she has 30 days to register the software to continue using it.

Which type of software has Pamela installed? Answers:

• Freeware


• Open-source


• *Shareware


• SaaS


Explanation:

Shareware is software that you can initially install for free for evaluation purposes. However, you then need to register and pay a fee to continue using it. In this case, Pamela has installed a shareware sound editor.

Freeware is software that's freely distributed and free of charge.

Open-source software is usually freely distributed with the source code also available for free.

SaaS is a subscription model that requires a yearly subscription fee to use the purchased software application. q_itf_softwareInstall_anti-malware

Which of the following is the BEST solution to secure your computer against viruses, spyware, and adware? Answers:

• *Anti-malware software


• Firewalls


• Passwords


• Anti-spam software


Explanation:

Anti-malware software should be installed on computer systems to detect and prevent viruses, spyware, and adware.

A firewall controls the flow of network traffic and protects systems from unauthorized network connections, including those from a malicious user. However, the best virus, spyware, and adware protection on a local device is to install and run an anti-malware software program.

Passwords can limit local access to a computer device but are not designed to protect against malware such as viruses, spyware, and adware.

Anti-spam software is designed to protect against unwanted, unsolicited emails sent to your email account. However, it is not designed to protect against malicious software such as viruses, spyware, and adware. q_itf_softwareInstall_facts_01

Software that requires a monthly subscription fee is often called           . Answers:

• *Software as a service


• Temporary software


• Online-only software


• Web applications


Explanation:

Software that requires a monthly subscription fee is called Software as a Service, or SaaS. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.4. q_itf_softwareInstall_facts_02

What is software that is delivered over the Internet through a web browser called?

Answers:

• *Web applications


• Temporary software


• Online-only software


• Shareable software


Explanation:

Web applications are delivered over the Internet through a web browser. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.4. q_itf_softwareInstall_facts_03

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

Answers:

• *CD or DVD installation


• Internet installation


• App Store installation


• Software subscription


Explanation:

Because software companies can't add updates to CDs or DVDs that have already been created, installing an application from these media often requires the user to check the company website for updates.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.4. q_itf_softwareInstall_facts_04

Which installation method is most likely to put your computer at risk of downloading a virus? Answers:

• *Internet installation


• CD or DVD installation


• App store installation


• Software subscription


Explanation:

CD, app store, and subscription installations usually come from reputable companies. Internet installations, on the other hand, are often from unverified sources.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.4. q_itf_softwareInstall_facts_05

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users.

Which of the following are possible consequences of this decision? (Select two.) Answers:

• The software company will never detect the violation so negative consequences are unlikely.


• *Your company is exposed to litigation by violating the software license agreement.


• *You risk losing your job.


• The software will eventually stop working properly for the 10 extra updates you installed.


• There are no consequences. By law, you are allowed 1 to 3 activations per user.


Explanation:

Circumventing license agreements exposes your company to litigation and puts your job at risk. Even without a mechanism for tracking the number of users that are using the software, the enterprise agreement limits the number of licenses you are legally entitled to use. Using more licenses than you are entitled to is an act of theft. Your best course of action is to purchase 10 more licenses.

The software company is likely to learn of the violation. One way they can learn of violations like this is when users register their copy of the software to obtain software support, patches, and bug fixes. Since there is no mechanism that enforces a limit to the number of times the key can be used, the software will most likely continue to function. The 1 to 3 activations per user usually pertains to the personal software licensing model or is meant to be used when users have more than one computer on which they need to use the software. These activations are not meant to be shared with other users.

q_itf_softwareInstall_license

Which of the following are important reasons for reading the documentation before installing an application on your computer? (Select two.)

Answers:

• *To make sure that the application is compatible with your operating system


• To make sure that the software provider is legitimate


• To make sure that you have all the software installation files


• *To make sure that you have a valid software agreement or license


• To make sure that you have the proper internet connection for installing the software


Explanation:

Before installing an application, make sure you read the documentation to find out if the software is compatible with your operating system.

Before installing an application, make sure you read the documentation to find out if you have a valid agreement or license for installing the software.

The documentation does not provide any guarantees that the software publisher or provider is a legitimate source for the application.

The documentation does not normally provide a list of all the software installation files, as these files can frequently change, and the user does not need to know about all the installation files.

The documentation does not normally provide information about internet connections, as installing the software online does not normally rely on any particular type of internet connection.

q_itf_softwareInstall_oem

Which of the following is the BEST place to find software updates? Answers:

• *Original equipment manufacturer (OEM) websites

• Third-party websites


• Cloud-based software subscription sites


• Web app sites


Explanation:

The best place to find software updates is on original equipment manufacturer (OEM) websites, such as Dell, HP, and Apple.

Before downloading patches from a third-party website, make sure the site is legitimate by searching for reviews from others.

Cloud-based software subscriptions, such as Office 365 and Adobe Creative Cloud, are configured to install updates automatically as they become available.

Web apps always include the latest software updates since they reside on remote servers. q_itf_softwareInstall_source_01

A system administrator is part of an IT team planning to install virtual private network (VPN) connection software on all company laptops and desktops. Which of the following is the MOST important precaution that should be taken before installing the software?

Answers:

• Make sure the website transaction for purchasing the software is secure.


• Back up all data files on all company devices before installing the software.


• *Obtain the installation files from a legitimate source.


• Update passwords on the company devices before installing the software.


Explanation:

As part of the installation process, the IT team should verify that they are obtaining the VPN installation files from a legitimate source. Otherwise, the software may be corrupted, unauthorized, or embedded with malicious code.

While security for purchasing software over the web is an important concern, it does not impact the installation of the software on company laptops or desktops.

While backing up data files can help prevent loss of information on company computers during installation, most software installation programs do not touch existing data files. The most important concern is that the installation files themselves are from a legitimate source.

While it is important for employees to update (change) their device passwords frequently, it is not an important precaution to take before installing software.

q_itf_softwareInstall_source_02

Which of the following are legitimate sources for obtaining software installation files for a device? (Select three.) Answers:

• *Authorized resellers


• APKs (Android Packages)


• *Merchant app stores


• *Google Play store


• Third-party apps


• Freeware websites

Explanation:

Authorized resellers, merchant app stores (such as Amazon App Store), and the Google Play store all have stringent tests that need to be passed before any software is offered for download. These are legitimate, trusted sources for obtaining software installation files.

APKs (Android Packages) are available from sources outside the Google Play store. While some APKs are legitimate and can be installed safely, others are vulnerable to viruses and malware, especially if you download them from an untrusted website.

A third-party app is an application provided for free or purchased by someone other than the device's manufacturer. Downloading and installing a software application from a third-party application store can infect a computer device with malicious software.

While freeware software can be useful and save you money, it can also contain spyware, adware, Trojans, viruses, and so on.

q_itf_softwareInstall_source_03

Which of the following are the BEST methods for ensuring that your computer is protected when you install an application purchased from an online store? (Select two.)

Answers:

• Order and use a CD/DVD installation disk instead of a downloaded installation file.


• *Make sure the website or publisher is a trusted software source.


• Use a software subscription service instead of purchasing a one-time installation file.


• *Scan a downloaded installation file for viruses and other malware before using it.


• Update or patch the software after installation.


Explanation:

Before installing an app from the internet, make sure the website or publisher is a trusted source. After downloading the installation file, scan it for viruses and other malware.

Using a CD/DVD installation disk instead of a downloaded installation file does not guarantee protection for your computer. You should still check to make sure the website or publisher is a trusted source and that the CD/DVD does not cause any issues when installing the application.

While subscribing to software can help you avoid issues with safely installing an application on your computer, the application might not be available as a software subscription service.

Updating or patching software after installation can help with bugs or software vulnerabilities, but it is not the best approach to making sure that the software itself is trustworthy before installing it on your computer. q_itf_softwareInstall_uninstall_01

A user has purchased a new computer with several pre-installed software programs that are not needed. What is the BEST way to deal with the unwanted software?

Answers:

• Upgrade the software for security reasons.


• *Remove (uninstall) all unwanted software.


• Check the software files with antivirus software.


• Remove (uninstall) only unwanted business software.


Explanation:

You might find that an app has been installed on your system without your knowledge or that your system came pre- installed with software that you will never need or want. The best way to deal with the software is to remove (uninstall)

it in order to free up storage space and to prevent security threats.

While you can upgrade the software to make sure you're protected against the latest security threats, upgrading is not the best way to manage unwanted software.

While you can check the software files to make sure they are virus-free, this check has already been done by the manufacturer and has no impact on a decision of what to do with the unwanted software.

Removing business software can free up significant storage space, but it is not the BEST solution for dealing with unwanted software.

q_itf_softwareInstall_uninstall_02

Rebecca has noticed that her new computer is beginning to run slower than when she first purchased it, especially when using business applications from her hard drive.

Which of the following would be the BEST solution to help speed up the processing time on the new computer? Answers:

• Delete any unwanted data files.


• Defragment the hard drive.


• Change the screen display to a lower resolution.


• *Remove (uninstall) any unnecessary software.


Explanation:

A new computer often comes with pre-installed software that can be configured to run when you start your computer. Over time, this software might cause your computer to run slower as it takes up processing resources. If Rebecca uninstalls any software she does not need, the processing speed could increase dramatically.

Deleting data files (such as word processing, video, or sound files) from a hard drive or SSD would free up storage space but would have no impact on processing speed.

While defragmenting your hard drive can keep it healthy and impact processing speed, Rebecca's computer is new, and the hard drive probably does not have fragmentation issues.

Lowering the display resolution does not help with processing speeds. q_itf_softwareInstall_win7

A system administrator needs to update a printer driver on the few remaining Windows 7 company laptops. Microsoft no longer offers support for Windows 7, so the administrator has found a third-party website with the driver available for download.

Which of the following should the administrator do before downloading and installing the driver? (Select two.) Answers:

• Make sure the OS (operating system) is up to date with the latest patches.


• Run a checksum on the driver package file and compare it against the one provided by the third party.


• *Search for references from others on the website's validity.


• *Check online forums for others who have tried installing the driver.


• Make sure that the driver is being downloaded over a secure HTTPS connection.


Explanation:

When downloading drivers from third-party sites, you should research as much as possible before downloading or installing the driver. You should check for references from others to make sure there are no warnings and that the website is valid.

You should try checking out forums or searching for reviews from others who have tried installing the driver package to see if there are issues or if the driver is legitimate.

Because Windows 7 is no longer supported, there may not be any patches available. And patching the OS does not have

any impact on driver legitimacy.

Running a checksum on the file and comparing the generated string against the one provided by the third party simply makes sure that your copy of the file is genuine and error free. It does not indicate whether the driver is valid or legitimate.

While HTTPS ensures that the data being transmitted is encrypted, it would not help the administrator determine if the driver is valid or legitimate.

q_itf_winupdate_facts_01

Which application makes sure your computer has the most recent versions of its system software? Answers:

• *Windows Update


• Disk Cleaner


• Windows Defender


• Backup and Restore


Explanation:

Windows Update is utility software that keeps your computer's other software up to date. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.2. q_itf_winupdate_facts_02

You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message.

Which of the following is the MOST likely first step that should be taken in troubleshooting the issue? Answers:

• Remove all memory modules and replace them one at a time until the error reappears.


• Check the voltage levels on the DC side of the power supply.


• Update the BIOS.


• Uninstall the last application or system update that was installed.


• *Search for the error in Microsoft's knowledgebase.


Explanation:

The first thing you should do when a "blue screen of death" has been displayed is identify the source of the error. Search for the text of the error message in Microsoft's knowledgebase or across the Internet in general using a search engine such as Google. This will help you identify what's causing the problem so you can troubleshoot it. q_itf_winupdate_facts_03

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features.

Which of the following would BEST protect your computers? Answers:

• Scheduled backups


• Scheduled disk maintenance


• *Windows updates

• Antivirus updates


Explanation:

By default, Windows 10 PCs automatically check for updates and install any updates it finds. Although this function can be disabled, Microsoft strongly encourages the use of automatic updates to find and install Windows updates as well as to keep the computers up to date with the latest features. These updates often include patches to fix security issues found in applications. Automatic maintenance can be used to perform these checks.

Scheduled backups are important to have and would be useful when a computer has a virus or the computer has been ransomed. It will not, however, keep the computer safe from application security leaks or update Windows with the latest features.

Scheduled disk maintenance allows the system to diagnose and repair disk errors. It does not back up files.

Antivirus software and updates are important when trying to protect your computer from viruses. However, additional steps should be taken to ensure that security leaks in applications are fixed. In addition, antivirus software does not update Windows with the latest features.

6.7 Network Troubleshooting Section Introduction

As you study this section, keep the following questions in mind:

• What are the most common causes of network problems?


• What network problems can be solved on your end? What problems need to be fixed by the ISP?


After finishing this section, you should be able to:

• Diagnose and fix network connection problems such as: o Unplugged network cable


o Incorrect TCP/IP settings


o Faulty network cable


o Network adapter problems


Key terms for this section include the following:

Term Definition


Ping

A utility that sends a single packet to a specified network address and waits for a reply. It's typically used to determine whether an IP address is accessible.


Tracert

A utility that shows the exact path a packet takes between two hosts on different networks.


6.7.1 Network Troubleshooting Tools (Lesson Video) Transcript:

In this video, we'll introduce two programs you can use to diagnose network problems: Ping and Traceroute.

First, let's talk about ping. The term comes from the sonar search capabilities of submarines, which can send out a high-

pitched noise and then listen for echoes on their radar. In computer networking, the ping utility sends a single packet to a specified network address, then waits for a reply. It's useful when you want to determine whether a particular IP address is accessible.

To use ping, open the command prompt by typing cmd into the search bar. Type "ping," then the address you want to check. For this example, let's use the TestOut website. When we press Enter, our computer will ping the TestOut website four times. Down here, we'll get a report on the results of the test. Our computer sent out four packets, then got four responses back. If we were troubleshooting a network problem, we could now rule out the possibility that the host we're trying to reach is unresponsive.

Next, we'll look at traceroute. Whenever you access a website, your network doesn't connect directly to the website's network. Instead, signals between your computer and the web server hop from one router to another along a complex web to reach their destination. Traceroute is a utility that shows the exact path a packet takes between two hosts on different networks.

To use it, we'll open the command prompt just like we did before. Then we'll type the name of the utility, tracert, followed by the address of the host. This time, let's use google.com. The route starts by showing the address of our router here at TestOut. Then, it shows each router the packet travels through on the way to Google's homepage. Network professionals use traceroute to find out where packets are getting stuck on their path to their destination.

In this video, we learned about two important networking utilities: Ping and traceroute.

6.7.2 Fix Network Adapter Problems (Demo Video) Transcript:

In this lab, you've recently installed a new network adapter. Unfortunately, it's been very slow. We'll take the new adapter offline and re-enable the old one so we can have fast Internet while we troubleshoot.

Search for Device Manager, then click it when it appears. This is where we can monitor, update, and manage all the hardware devices on our computer. To start, let's disable the old adapter. Open the Network adapters list, right-click the Broadcom adapter, then click Disable device. Next, right-click the RealTek adapter and click Enable device.

Finally, right-click the RealTek adapter and select Update driver. Click here to search the Internet for new software, then wait while the driver updates.

6.7.3 Fix Network Adapter Problems (Simulation) Scenario

The new Broadcom network adapter you recently installed is experiencing very slow transfer speeds. In this lab, your task is to use Device Manager to resolve network adapter issues as follows:

1. Disable the Broadcom network adapter until a fix can be found.


2. Enable the RealTek network adapter to take the place of the Broadcom adapter.


3. Update the drivers for the RealTek network adapter using Microsoft Update.


Explanation

Complete this lab as follows:

1. Disable the Broadcom network controller. a. Right-click Start and select Device Manager .


b. Expand Network adapters .


c. Right-click Broadcom NetXtreme 57xx Gigabit Controller and select Disable device .


d. Click Yes to confirm your selection.


2. Enable and update the drivers for the RealTek network controller. a. Right-click RealTek RTL8139C Fast Ethernet Controller and select Enable device .


b. Right-click RealTek RTL8139C Fast Ethernet Controller and select Update driver .

c. Select Search automatically for updated driver software .


d. After the driver has been updated, select Close .


6.7.4 Fix a Network Connection 1 (Demo Video) Transcript:

In this lab, we need to troubleshoot a computer that isn't connecting to the network. To start, we'll open Network & Internet settings. From here, we can verify that there is no network connection. If we click Change adapter options, we can view the status of our NIC. This indicates that the cable is unplugged – that's the next thing we should check. Switch to the hardware view, then check the back of the computer. Here, we can see that the network cable that's plugged into the NIC isn't plugged into the wall plate. Let's fix that now.

Back in Windows, our network icon has updated from a red X to a yellow triangle. On our network diagram, we can see that we're connected to the network, but we don't have Internet access. In the Network Connections dialog box, we can see that we're connected to an unidentified network.

Our network doesn't have a DHCP server, so we'll need to manually change the TCP/IP properties to match our network's settings. Right-click the network, then click Properties. Select Internet Protocol Version 4, then click Properties. From here, we can change the values to the ones provided by the scenario. Once we're done, the triangle disappears from the network icon and our diagram shows that we have Internet access.

6.7.5 Fix a Network Connection 1 (Simulation) Scenario

You are the IT administrator for a small corporate network. The computer is connected to the network as shown in the Exhibit. One morning, you find that the workstation in Office 1 can no longer connect to the network.

In this lab, your task is to diagnose and fix the problem(s). Use the following steps to walk through the troubleshooting process:

1. Open Network & Internet settings to check the initial status of the network.


2. Answer Question 1.


3. Select Change adapter options to get more information.


4. Answer Question 2.


5. In the top navigation tabs, select Office 1 and plug the workstation into the network.


6. Return to the operating system view and check the status of the network.


7. Answer Question 3.


8. Use Network & Internet settings to view and change the properties of the Ethernet adapter.


9. Since the network does not have a DHCP server, you will need to manually change the TCP/IPv4 properties as follows: o IP address: 192.168.0.15 (or another valid address)


o Subnet mask: 255.255.255.0


o Default gateway: 192.168.0.5


o Preferred DNS server: 163.128.80.93 (or another valid address)

10. Verify the final status of the network.


11. Answer Question 4.


Explanation

In this lab, your task is to complete the following:

• Connect the computer to the network.


• Modify the TCP/IP settings for the computer to match the network configuration: o Workstation IP address: choose any address between 192.168.0.15 and 192.168.0.254 except for the addresses of the workstations (192.168.0.30 - 192.168.0.34).


o Subnet mask: 255.255.255.0


o Default gateway: 192.168.0.5


o DNS server: either 163.128.80.93 or 163.128.78.93 (default values).


Complete this lab as follows:

1. Verify the problem as follows: a. In the notification area, right-click the Network icon and select Open Network & Internet settings . The network map shows no connection to the internet.


b. Answer Question 1: What is the initial status of the network?


c. Select Change adapter options to help determine why.


d. Notice the status for the network connection is network cable unplugged.


e. Answer Question 2: What is the initial status of the Ethernet adapter?


f. Close the Network Connections window.


g. Close the Network and Internet settings window.


2. Connect the cable as follows: a. In the top navigation tabs, select Office 1 to work with the computer hardware.


b. Above the computer, select Back to switch to the back view of the computer. The computer has a network cable, but the link light is not on.


c. Select the network cable connected to the computer to see what is connected to the other end. In the Selected Component window, notice that one end is unconnected.


d. Select the unconnected end and drag it to the network connection on the wall plate.

3. Fix settings as follows: a. On the monitor, select Click to view Windows 10 to switch to the operating system view. The notification area shows a network connection, but no internet connection.


b. Answer Question 3: After fixing the hardware issue, what is the status of the network?


c. Right-click Start and select Network Connections .


d. Maximize the Network Status window for easier viewing.


e. From the left pane, select Ethernet .


f. Select Change adapter options .


g. Right-click Ethernet and select Properties .


h. Select Internet Protocol Version 4 (TCP/IPv4) .


i. Select Properties .


j. Compare the current TCP/IP configuration with the required configuration shown in the Exhibit.


k. In the IP address field, enter a correct IP address , such as 192.168.0.15 .


l. In the Subnet mask field, enter 255.255.255.0 .


m. In the Default gateway field, enter 192.168.0.5 .


n. In the Preferred DNS server field, enter a correct DNS server address , such as 163.128.80.93 .


o. Click OK .


p. Click Close .


q. Close the Network Connections window.


r. Verify the internet connection in the Network and Internet Center.


s. Answer Question 4: After fixing the software issue, what is the status of the network?


6.7.6 Fix a Network Connection 2 (Demo Video) Transcript:

In this lab, you need to troubleshoot a computer that isn't connecting to the network. To start, open PowerShell by typing it into the search bar. If we run ipconfig, we can see that the Ethernet network says the media is disconnected. If we switch to our hardware view, we can see that the computer's NIC is connected to the wall plate. However, if we zoom in very close, we can see that the network link light is turned off. Something's not right here. Let's replace this cable with a known good spare. Unplug the old cable and drag it back to the shelf. Then, select the Cat6 cable, plug one end into the computer, and plug the other end into the wall plate. The network link light is now blinking, which means it has a network connection. If we run ipconfig one more time, we can see we're connected to the CorpNet.com network.

6.7.7 Fix a Network Connection 2 (Simulation) Scenario

You are the IT administrator for a small corporate network. The workstation computer is connected to the network as shown in the Exhibit. One morning, you find that the workstation in the Support Office can no longer connect to the 100 Mbps network.

In this lab, your task is to diagnose and fix the problem. Use the following steps to walk through the troubleshooting process:

1. Open Windows PowerShell and use the ipconfig command to check the initial status of the Ethernet adapter.


2. Answer Question 1.


3. In the top navigation tabs, select Support Office and check to see if the workstation is plugged into the network.


4. Answer Question 2.


5. Check to see if the network link light on the back of the computer is turned on.


6. Answer Question 3.


7. Remove the faulty network cable from the computer and the wall outlet.


8. To support 100 Mbps or greater speeds, connect the Cat6a cable on the shelf to the computer and the wall outlet.


9. Return to the operating system view and use ipconfig to verify the status of the Ethernet adapter.


10. Answer Question 4.


Explanation

In this lab, your task is to complete the following:

• Diagnose and correct the problem.


• Replace the faulty network cable with a working Cat6a cable.


Complete this lab as follows:

1. In the notification area, hover the mouse over the Network icon. Notice that the computer is not connected to the network.


2. Get more information about the problem as follows: a. Right-click Start and select Windows PowerShell .


b. At the command prompt, type ipconfig and press Enter to view information about the network adapter. Notice that the media is disconnected.


c. Answer Question 1: What is the initial status of the Ethernet adapter?


3. Verify the physical configuration of the computer as follows: a. From the top navigation tabs, select Support Office .


b. Above the computer, select Back to switch to the back view of the computer.


c. Select the network cable .

d. Make sure the other end of the network cable is plugged into the wall outlet.


e. Answer Question 2: Is the network cable connected to the computer and plugged into the wall outlet?


f. Answer Question 3: Is the network link light on the back of the computer turned on?


g. Because the network cable is connected to the computer and the wall outlet without any network activity, it appears that the cable might be faulty.


4. Connect to the network using a known good networking cable as follows: a. On the back of the computer, drag the RJ45 connector to the Workspace to disconnect it.


b. Drag the RJ45 connector from the wall outlet to the Shelf.


c. On the Shelf, select the CAT6a Cable because it gives you 100 Mbps or greater speeds.


d. Under Selected Component, drag the RJ45 connector to the network card on the computer.


e. Under Selected Component, drag a other RJ45 connector to the network connection on the wall outlet.


f. Notice that the network link light on the back of the computer has now turned on.


5. On the Support monitor, select Click to view Windows 10 to switch to the operating system view.


6. Verify the connection as follows: a. At the command prompt, type ipconfig and press Enter .


b. Answer Question 4: After resolving the hardware problem, what is the status of the Ethernet adapter?


c. In the notification area, right-click the Network icon and select Open Network & Internet settings .


d. Verify the status of the Ethernet adapter.


6.7.8 Section Quiz (Section Quiz)

6.8 Networking Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of networking professionals affect my daily life?


• How can I prepare for a career in networking?


This section describes common careers in computer networking. After finishing this section, you should be able to:

• Describe various careers in computer networking, including network administrator, network architect, and network

technician.


• Identify skills and educational requirements for computer networking careers.


Key terms for this section include the following:

Term Definition


Network Administrator

A person that maintains and expands a company's network. They install and configure network media, create and manage user accounts, implement firewalls and other network security, manage an organization's mail system, configure network printers, and maintain Internet connectivity.


Network Architect

A person that develops and implements an organization's communication network, including the hardware and software components needed for both physical and wireless connections.


Network Technician

A person that works closely with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems reported to a company's IT help desk and assist users in resolving network connection problems, such as replacing defective network cables and modifying Wi-Fi settings.


6.8.1 Careers in Networking (Lesson Video) Transcript:

Computer networking professionals design, implement, and maintain a company's networking infrastructure, including Internet connectivity and online security. In this video, we'll explore a few specific networking careers.

Network architects develop and implement an organization's communication network, including the hardware and software components needed for both physical and wireless connections. Based on the needs of an organization, they design intranets, cloud infrastructure, and information security. They work with communication hardware such as cabling, routers, and network adaptors. Network architects are familiar with network protocols, data formats, and project management. In addition to several years of on-the-job experience, these positions typically require industry certifications in network design and implementation.

Network administrators maintain and expand a company's network. They have a broad range of responsibilities, including installing and configuring network media, creating and managing user accounts, implementing firewalls and other network security, managing an organization's email system, configuring network printers, and maintaining Internet connectivity. Network admins also perform regular backups of files saved on the network and train users in accessing network resources.

Network service technicians work closely with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems reported to a company's IT help desk and assist users in resolving network connection problems, such as replacing defective network cables and modifying Wi-Fi settings. Network technician jobs typically do not require as much education and on-the-job experience as architects, engineers, and administrators.

In this video, we introduced a few career options that involve computer networks. We looked at network architects, network administrators, and network service technicians. Careers in networking typically require a college degree and one or more IT industry certifications.

6.8.2 Networking Career Facts

Computer networking professionals design, implement, and maintain a company’s networking infrastructure, including internet connectivity and online security. Careers in networking typically require a college degree and one or more IT industry certifications.

This lesson covers the topic of networking careers. Networking Careers

The following table describes some careers available in networking. Table 1: Networking Careers

Job Title Description


Network

Network architects develop and implement an organization's communication network. This


Network

Network administrators maintain and expand a company's network. They have a broad


Net

Network service technicians work closely with network administrators to ensure


6.8.3 Interview: Network Administrator (Lesson Video) Transcript:

There was a time where I made a change and I brought one of our remote offices in Australia down.

A typical day for me is always changing. Today is going to be tickets and tomorrow it could be someone was digging a hole and cut a fiber and therefore loses Internet.

I am a network engineer and my responsibilities are data center infrastructure management and being able to deploy data centers and office integrations. I like being able to play with new technology. The technology is always changing in

networking. So being able to be at the top of that, and being able to see what new features come out – protocols, things like that. Probably my most favorite part about my job.

Typical route to getting into this field - I think helpdesk is one of the most critical jobs you can get. And the service desk helps you understand what it takes to communicate with an end user, to be patient with an end user, and so these skills get built up as you work at that low level. I only had an understanding of networking from school and the little amount that I've done like in my house: Building labs, setting up networks for family, stuff like that. That is base of kinda getting started.

When you go to a course of CCNA for Cisco that's a Cisco certification. It differs on what you're looking to go into and how well-rounded you want to be. I know people that are very much vendor locked in Cisco or they're vendor locked into Arista or Brocade or Palo Alto or Juniper and they get their certification specifically to that vendor, and that makes them a professional that vendor. And it kinda goes to where you're wanting to be. Do you want to be a Jack of all trades or you do you want to be a professional?

Advice that I'd give someone that's looking to get into networking would be "be willing to fail." There was a time where I made a change and I brought one of our remote offices in Australia down. And having to walk through my boss's office and be like, "Uh, I just did something." And the questions kinda goes it's like, "What are you gonna do to fix it?" It's like, "Whoa - you're not gonna fix it for me?" But that was an experience that, it's almost like you have to have in order to know, like, how to resolve the issue. Being a learner is very critical to this field - being willing to kind of like accept your faults and knowing that you don't really know everything. You are still learning and being able to learn is just part of the job.

6.8.4 Section Quiz (Section Quiz) q_itf2_networkcareers_01

Which of the following IT jobs includes installing and configuring network media? Answers:

• *Network administrator


• Network architect


• Support specialist


• Database administrator


Explanation:

Network administrators maintain and expand a company's network. They have a broad range of responsibilities, including installing and configuring network media.

Network architects specialize in configuring communication hardware such as cabling, routers, and wireless adapters. Database administrators create and maintain databases.

Support specialists help end users when they have problems using a product. q_itf2_networkcareers_02

Which of the following IT jobs typically do not require as much education or on-the-job experience? Answers:

• Network architect


• Network administrator


• *Network technician


• Network engineer


Explanation:

Network technician jobs typically do not require as much education or on-the-job experience as architects, engineers, and administrators.

q_itf2_networkcareers_03

Which of the following statements is true regarding a network architect? Answers:

• *They typically require an industry certification in network design and implementation.


• They perform regular backups of files saved on the network and train users in accessing network resources.


• They work closely with network administrators to ensure uninterrupted access to the company network.


• They have a broad range of responsibilities, including creating and managing user accounts.


Explanation:

In addition to several years of on-the-job experience, network architects typically require an industry certification in network design and implementation.

Network administrators perform regular backups of files saved on the network and train users in accessing network resources. They have a broad range of responsibilities, including installing and configuring network media as well as creating and managing user accounts.

Network technicians work closely with network administrators to ensure uninterrupted access to the company network. q_itf2_networkcareers_04

Which of the following statements is true regarding a network technician? Answers:

• They are familiar with network protocols, network adapters, data formats, and project management.


• *They troubleshoot reported problems and assist users in resolving network-connection issues.


• They design intranets, cloud infrastructure, and information security based on the needs of an organization.


• They manage an organization's email system, configure network printers, and maintain internet connectivity.


Explanation:

Network technicians troubleshoot problems reported to a company's IT help desk and assist users in resolving network- connection problems.

Based on the needs of an organization, network architects design intranets, cloud infrastructure, and information security. They are familiar with network protocols, network adapters, data formats, and project management.

Network administrators have a broad range of responsibilities which include managing an organization's email system, configuring network printers, and maintaining internet connectivity.

q_itf_networkcareers_facts_01

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Answers:

• *Network Architect


• Database Administrator


• Security Analyst


• Programmer


• Support Specialist


Explanation:

Network architects specialize in configuring communication hardware such as cabling, routers, and wireless adapters.

Database administrators create and maintain databases. Security analysts protect networks from unauthorized access. Programmers write computer code.

Support specialists help end users when they have problems using a product. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.8.

7.0 Databases

7.1 Chapter Introduction


A large group of people inside of a data center viewing many instances of different graphs and charts. Illustration. Databases

This chapter describes the purposes and functionality of database systems. It introduces database design techniques, data access methods, and the challenges and opportunities associated with Big Data. Students practice configuring database objects, writing SQL commands, and designing tables within a database management system. The chapter concludes with a brief look at common careers associated with database systems.

After finishing this chapter, you should be able to:

• Describe the advantages of using databases to store and access data.


• Describe the purpose of a database management system.


• Use Microsoft Access to modify tables, forms, queries, and reports.


• Describe the basic principles of relational database design.


• Write simple SQL commands to retrieve and modify data.


• Identify the challenges and opportunities associated with Big Data.


• Identify common careers in working with databases.


7.2 Introduction to Databases Section Introduction

As you study this section, keep the following questions in mind:

• How do I use databases in my everyday life?


• How do different kinds of database objects work together?


• How are databases similar to spreadsheets? How are they different?


After finishing this section, you should be able to:

• Describe the advantages of using a database rather than a flat file to store information.


• Describe the role of data modeling in database design.


• Compare and contrast operational data with analytical data.


• Describe the purpose of a database management system.


• Use Microsoft Access to explore database objects.


Key terms for this section include the following:

Term Definition


Database

A structured set of data held in a computer, usually in a way that is accessible by multiple concurrent users.


Data Modeling

A way to help programmers and other related parties make sense of database information.


Operational Data

Data that is produced by an organization's everyday operations. It's gathered in real time to provide a snapshot of what's happening in the present.


Analytical Data

Historical data that is used to help people make decisions in the present. It's various categories include market data, transactional data, sensor data, natural language, and machine data.


Database Management System (DBMS)

Software that allows users to define, manipulate, retrieve, and manage data stored in a database. Examples are Microsoft SQL Server, Oracle Database, MySQL, and Microsoft Access.


Table

A data structure in a relational database that is comprised of fields (columns) and records (rows).


Query

A method of asking questions about the data stored in a database.


Form

A graphical interface that allows users to query a database by filling in information on the form.


Report

An easy-to-read listing of the results of a query.


7.2.1 What is a Database? (Lesson Video) Transcript:

In this section of the course, we're going to learn about databases. At its most basic level, a database is an organized collection of information on a computer. Any kind of information you can think of can be stored in a database – Names, dates, files, pictures, transactions, comments, messages, numbers - the list goes on and on. Data is a vital part of any organization. By using databases to collect, store, and retrieve data, businesses and individuals can make informed decisions and plan effectively for the future.

There are many kinds of databases. Each type uses different techniques and serves a different purpose. That said, almost all databases share the following characteristics and features.

First, centralized access for multiple users. Most databases need to be used by more than one person, so they allow many individual users to access the data at the same time without having to wait or take turns.

Second, security. Databases have measures in place to make sure only authorized users can get to the data. Additionally, different users have different privilege levels. While a top-level administrator can view and edit all the data, lower-level users may be able to see records but not change or delete them.

Third, recovery. Information contained in a database is valuable and losing it could cause irreparable damage for an organization. Databases are easy to back up, which means the data can be restored if something goes wrong.

Fourth, scalability. Databases may store thousands, millions, or even billions of data points. Imagine keeping track of a billion rows on a spreadsheet – not very easy. Fortunately, a good database makes analyzing a million records just as

easy as analyzing a few dozen.

Each database is managed by a software package called a database management system, or DBMS. The DBMS determines the format and structure of the database and provides users with tools they need to work with the data. In this course, we'll use a DBMS called Microsoft Access. We chose Access because it's a great introductory tool for learning how databases work. It's also sometimes used at very small companies where only a few people need to use the database. That said, most companies need a DBMS with more features and security. Some of the most common ones are MySQL, Oracle Database, and PostgreSQL.

In today's world, databases are everywhere, and most people use them every day. Don't believe me? Let's look at a typical Friday evening and count the databases.

On the way home from school or work, you stop by the grocery store. You scan each of your items using the self- checkout stand, swipe your loyalty card, and pay with your debit card. Once you get home, you go to your favorite pizza chain's website, place an order from their online menu, and pay with your credit card. While you wait for the pizza to show up, you check your favorite social media platform then browse for a good movie on your video streaming service. In the course of about an hour, you seamlessly used seven databases.

7.2.2 Data Modeling Database Processes

Since databases are used to securely store information and to create reports about this data, before getting too deep into creating your first database, you should consider the processes and servers tools that will be needed to create and use your databases. A few of the important processes to consider are:

• Creation - One of the first processes that should be considered, is to determine exactly what will be stored in the database, where the data will be stored, and how to make the data accessible to those who need. it.


• Input/import - The next process to consider is how the data will be entered into your database. In some cases much of the data can be entered manually. At other times, you may want to import the data from another source.


• Storage - Some applications can be used to generate and present data for visual consumption only. The calculator in Windows is a good example. When the calculator is closed, all the data it generated is lost. However, many other applications need some place for its data to be stored so it won't be lost when the application is terminated. This storage is often referred to as data persistence. Persistent data is typically stored on a hard disk. A database is one option for persistent data storage.


• Queries - The information stored in a database is useful only if it can be easily retrieved. One of the best ways to retrieve database information is to use queries. A database query is a request to access data from the database.


• Reports - Closely related to queries is the ability to take the data queried and to transform it or format it in a way that makes it easy to read and interpret.


Databases vs. Flat File Systems

As you consider using databases, you may be asking yourself why not just use a flat file system, such as an Excel spreadsheet or maybe even a simple comma separated value (CSV) file.

While flat file systems are useful for such things as transferring information between systems or for tracking sales orders, they have several drawbacks. For example, consider the following advantages of a database over a flat file system:

• Processing speed - Databases can store thousands, millions, or even billions of data points. Imagine keeping track of a billion rows on a spreadsheet – it wouldn't be easy. Fortunately, a good database makes analyzing a million records just as easy as analyzing a few dozen.


• Backup and recover - Databases provide tools to backup information entered within seconds of it being committed. This means that through this backup process and through replication, lost data can be easily recovered.


• Forced Data types - A data type is an attribute attached to a value that tells the compiler or interpreter how the data should be used. Databases let you control or force data types and to validate the information entered.

• Concurrent use - Databases allow many individual users to access the data at the same time without having to wait or take turns. A database can support thousands or even millions of users at one time. This is difficult to do with a flat file system because of the high speeds required to track transaction. In most cases, when a single file is opened, a lock is placed on the file preventing it from being used by other users.


• Security - Databases have measures in place to make sure only authorized users can get to the data. Additionally, users can have different privilege levels. While a top-level administrator can view and edit all the data, lower-level users may be able to see records but not change or delete them.


Database Modeling

Creating databases for business purposes can be a complex process. Data modeling is a way to help programmers and other related parties make sense of complex business flow.

These models help organize data and make sure that there's consistency in elements, such as naming conventions, default values, and the security apparatus within the database. It's like a blueprint that an architect creates to show how everything is supposed to fit together. These models can also help you easily identify missing or redundant data.

There are various kinds of data models, all of which serve a different purpose and have varying levels of complexity. These include conceptual data models, logical data models, and physical data models.

Data Modeling


Pyramid outlining the different tiers of detail (i.e. conceptual, logical, and physical) in data modeling. Database Keys and Other Vocabulary

It is important to understand about database keys. A primary key is found in one or more columns of data and contains a unique identifier for the row (like a home address). Every entry must have a unique identifier in the primary key column. A foreign key is a column that refers to a primary key that exists in another table. These values can be duplicated, allowing an entry to reference a value from another table.

In a database, an entity is a real-world element that's being used in a business. For example, each customer of a business is an entity. A product that a business sells is another example of a database entity.

An attribute is a property or characteristic of an entity. For example, the customer's name and phone number are properties of an entity. The name and price of a product are attributes of that product.

A relationship is an association or dependency between two entities. The sale of a product to a specific customer is a relationship between two entities.

Conceptual Data Models

A conceptual data model is the least complex type of data model as it focuses only on high-level concepts. This data model answers the question of what a system contains. It's an organized view of the data that you need to support the processes your business is running. It looks at data that's being used, but not at how it's processed or its physical attributes.

The purpose of this kind of model is to organize and define business concepts and rules. It shows what all the entities are, their attributes, and their relationships. It's developed without looking at hardware specifications like storage capacity.

This kind of model doesn't use a primary or foreign key. It can show that two entities are related, but it doesn't specify the attributes that make them so. These types of models are typically more straightforward and easier to read than other types.

Logical Data Models

A logical data model is a little more complex than a conceptual model because it expounds the details of the data. This data model answers the question of how a system should be structured. However, it does not show how to implement the database with a particular database management system (DBMS). It also doesn't take system hardware into account.

The purpose of this model is to develop a technical map of rules and data structures. It provides the foundation on which a physical data model can be built. These kinds of data models are more technical and can appear very complex to the average user. It can include both primary keys and foreign keys in addition to entity names, entity relationships, and attributes.

Logical data models typically include the following information:

• The objective and scope of the model. This communicates to the database developers what the end objective is.

• The names of the objects or entities in the model. This can include any technical jargon that relates to the project.


• Diagramming conventions.


• Business data points.


• Data abstractions.


Physical Data Models

A physical data model is the most complex type because it focuses on exactly how to implement a data model within a specific DBMS. It also includes technical and performance requirements for the specific hardware system the database will run on. A physical data model describes the data that's going to be needed for a single project and should provide enough detail so the database itself can be created.

7.2.3 Analytical vs. Operational Data


Data shown on a computer tablet through bar and line charts. Photo by Luke Chesser on Unsplash

All organizations can benefit from analyzing data. There are, however, different kinds of data and each can be used most productively in certain situations. In the broadest sense, the two main categories are operational data and analytical data. The type of data you use will depend on the problem you're trying to solve.

Operational Data

Operational data is simply data that's produced by an organization's everyday operations. It's data that's gathered in real time to provide a snapshot of what's happening in the present. What exactly this kind of data is depends on what a specific organization does on a day-to-day basis. For example, if you're running a hardware company, operational data might include how many customers you have at a given time, your inventory levels, or your profit margins. These are usually things that are easily observed and measured, especially with the help of added technology. This data type is most useful for quick updates and least useful for deep analysis.

Operational data answers the "What?" questions, like, "What were our inventory levels today?" It doesn't deal with hypotheticals but instead in concrete, strictly observable things.

Operational Data


Transactional or operational database as a source for reports, dashboards, and other analysis. Illustration. Analytical Data

Analytical data is historical data that's used to help people make decisions in the present. It's data that's meant to undergo deeper analysis. Being historical data means that it isn't real-time relevant. In other words, it's data that doesn't apply to the literal here-and-now. Data doesn't have to be months or years old to be considered historical, though. Depending on the situation, data could be historical even if it was retrieved a few hours before.

This data type can easily be visualized using charts and graphs. It can show trends that help those in charge make mission-critical decisions for the future.

Data like this answers the "What if?" questions, as in, "What if we sold this product instead of another one? What would that likely do to our sales?" You could analyze historical data to try to answer this question.

Analytical Data


Analytical database pulling data from a transactional database and publishing reports, dashboards, and other analysis. Illustration.

There are various categories of data that are considered analytical data, including the following:

• Market data : Use this data type to gauge markets trends in order to decide what to do in the present, such as which companies to invest in.


• Transactional data : Use this data type to look at what customers have historically purchased in order to decide what products to make in the present.

• Sensor data : Use this data type to observe historical data from sensors, such as weather and climate information over time.


• Natural language : Use this data type to observe language, such as social media posts that can be used to look for trends in customer preferences.


• Machine data : Use this data type to look at data generated by computer hardware or software. You can better understand your technological landscape this way.


7.2.4 Database Management Systems (Lesson Video) Transcript:

A database management system is software that creates and manages databases. It acts as an interface between the raw data stored in the database and people who want to use or analyze the data. Using a DBMS, people can create, read, update, and delete data. Common database management systems include Microsoft SQL Server, Oracle Database, and MySQL.

Another DBMS you may encounter is Microsoft Access. Access is much less powerful and versatile than the other systems we mentioned – a typical Access database is used by only a small handful of people. That said, it's an excellent tool for teaching foundational database concepts. In this video, we'll look at a simple Access database and discuss four database objects: tables, queries, forms, and reports.

Tables form the backbone of any database. This database has six tables, each with a different kind of data. To open an Access table, double- click on it. This table stores information about our employees. We have their names, which of our three locations they work at, their hire and birth dates, and their home addresses. The products table has each of our products, as well as their product types and prices. The Orders table is a little bit different. Rather than having its own information, it takes information from three other tables – the Employees table, the Customers table, and the Product table. Using this table, we can see which employees have sold which products to which customers and the date of the transaction. To close a database object, click on this x.

The next database objects are queries. I like to think of queries as questions I ask my database. For example, I might ask "How many sales have we made this week"? A query can instantly collect all of the data I'm interested in from my tables, as well as performing calculations on it. This query shows each day of the past week, along with the total number of sales and the money made from sales for each day. Queries are also a great way to see data from different tables. This query combines related data from the Employees table and the EmployeePhones table.

Next are forms. Forms provide a convenient way for users to enter data into their tables. This is especially helpful if multiple people are using the same database because forms reduce the chances of making data entry errors. They also help prevent users who don't understand how the database works from changing important settings on the tables.

Last are reports. Reports provide good-looking printable summaries of your data. They can be based on tables, queries, or both. Some reports also contain summary information. This report breaks down the restaurant's sales by product type. For each product we see the amount sold, as well as the total revenue for that product. At the bottom of the page, we have the total sales of the entire database.

In this video, we discussed database management systems. We also used Microsoft Access to look at four database objects: tables, queries, forms, and reports.

7.2.5 Database Management System Facts

A Database management system (DBMS) is software that allows users to define, manipulate, retrieve, and manage data stored in a database. The following table describes the four most popular DBMSs. While they all function similarly, it's important that you have a basic understanding of each in order to choose the most appropriate DBMS to meet your needs.

Table 1: Database Management Systems DBMS

DESCRIPTION


Microsoft SQL Server

Microsoft SQL Server is a proprietary relational database management system developed by Microsoft. It was released in 1989. It is a database server that supports transaction processing, business intelligence, disaster recovery, and

analytic applications. As an enterprise software solution, it provides robust security and protection for a company's databases.


Oracle Database

Oracle Database is a highly-scalable, robust, industry-standard DBMS. It was released in 1980 by Oracle Corporation. It is commonly trusted by larger companies to manage and secure enterprise databases. Oracle continually provides software updates to maintain a high quality product. Oracle DB supports more programming languages than Microsoft SQL Server and MySQL.


MySQL

MySQL is an open-source DBMS distributed by Oracle since 1995. Many people who manage their own websites and databases prefer to use MySQL because it provides SQL database implementation that works well for small to medium websites.


Microsoft Access

Microsoft Access is a DBMS developed by Microsoft that works effectively to create and manage small relational databases with a few users. It was released in 1992 as part of Microsoft's Office suite. Access databases are composed of four kinds of database objects: tables, queries, forms, and reports. An advantage to using Access is that it is easy to set up and can be a great introduction to relational databases for inexperienced users.


Database management systems can be evaluated and compared based on a number of different factors, including:

• Number of concurrent users supported.


• Scalability as databases expand.


• Speed of access.


• Support for different data types.


• Programming language support.


7.2.6 Explore an Access Database (Demo Video) Transcript:

In this scenario, you'll work as an end user with an Access database. Microsoft Access is a simple database management system.

First, let's delete a record from a table. Double-click the customers table to open it. Right-click the grey box next to Ronald Fisher's record, then click Delete Record.

Next, we'll change a record by using a form. Double-click the Orders form to open it. Use this arrow to navigate to record 11. Change the product from Combo #1 to Combo #2.

Now let's print a report. Double-click the Total Sales by Product report to open it. Click file, then print, then Quick Print. To change the name of a query, right-click the query, then click Rename. Type a new name for the query, then press Enter.

Finally, to delete a query, right-click the query, then click Delete.

7.2.7 Explore an Access Database (Simulation) Scenario

You've recently created an Access database to keep track of sales data.

Now you need to make a few minor record changes, print a report, and modify some other database objects. Perform the following tasks:

1. Delete Ronald Fisher's record (#12) from the Customers table .


2. In the Orders form , change the order for record 11 from Combo #1 to Combo #2 .

3. Print the Total Sales by Product report .


4. Change the name of the Sales This Week query to Total Sales This Week .


5. Delete the Products Under $2 query .


Explanation

To complete this lab, do the following:

• Delete a record from a table. 1. Open the Customers table by double-clicking it in the Navigation Pane.


2. Select the Ronald Fisher record to delete by clicking the gray box to the left of the record.


3. Press the Delete key, then click Yes .


• Change a record using a form. 1. Open the Orders form by double-clicking it in the Navigation Pane.


2. Navigate to record 11 by using the black arrows near the bottom of the screen.


3. Change the record's Product by clicking the dropdown arrow next to Combo #1 and selecting Combo #2 .


• Print a report. 1. Open the Total Sales by Product report by double-clicking it in the Navigation Pane.


2. Click File to open the Backstage View .


3. Click Print on the sidebar, then click Print in the middle of the screen.


• Change the name of a query. 1. Right-click the Sales This Week query in the Navigation Pane and select Rename .


2. Type Total Sales This Week as the new name for the query.


3. When you're done, click away from the name.


• Delete a query. 1. Select the Products Under $2 query by clicking it in the Navigation Pane.


2. Press the Delete key, then click Yes .


7.2.8 Section Quiz (Section Quiz)

q_itf2_datamodeling_01

Which of the following is a way for programmers and others to make sense of complex business flows? Answers:

• Primary keys


• *Data modeling


• Database management system


• Microsoft Access


Explanation:

Data modeling is a way for programmers and others to make sense of complex business flows. These models help organize the data, making sure that there is consistency in the database with things like naming conventions, default values, and security while at the same time making sure that the data is of high quality.

A primary key is found in one or more columns of data and contains a unique identifier for the row. This is similar to a home address.

A database management system (DBMS) determines the format and structure of a database and provides users with the tools they need to work with the data.

Microsoft Access is one of the most popular DBMS programs available. q_itf2_datamodeling_02

Which of the following is found in one or more columns of data and contains a unique identifier for the row? Answers:

• *Primary key


• Foreign key


• Relationship


• Attribute


Explanation:

A primary key is found in one or more columns of data and contains a unique identifier for the row. This is similar to a home address. Each entry must have something different in the primary key column.

A foreign key is a column that refers to a primary key in another table. These values can be duplicated, and this allows an entry to reference a value from another table.

A relationship is an association or dependency between two entities. An attribute is a property or characteristic of an entity. q_itf2_datamodeling_03

Which data model focuses on high-level concepts? Answers:

• Logical


• Physical


• Operational


• *Conceptual


Explanation:

A conceptual data model focuses only on high-level concepts. This data model answers the question of what a system contains.

A logical data model focuses on how a system should be implemented regardless of the database management system (DBMS) being used.

A physical data model describes how the system will be implemented with a specific DBMS system. Operational data is data that is produced by an organization's everyday operations. q_itf2_datamodeling_04

Which data type uses historical data to make decisions in the present? Answers:

• Operational


• *Analytical


• Conceptual


• Logical


Explanation:

Analytical data is historical data that is used to help employees make decisions in the present. It is data that is meant to undergo deeper analysis.

Operational data is simply data that is produced by an organization's everyday operations. It is data that is gathered in real time to provide a snapshot of what is happening in the present.

A conceptual data model focuses only on high-level concepts. This data model answers the question of what a system contains.

A logical data model focuses on how a system should be implemented regardless of the database management system (DBMS) being used.

q_itf2_datamodeling_05

Which type of analytical data can help you make investment decisions? Answers:

• Transactional


• Machine


• Sensor


• *Market


Explanation:

Market data allows you to look at historical trends in various markets in order to decide what to do in the present, such as which companies or funds to invest in.

Transactional data allows you to look at what customers have historically purchased in order to decide which products to make in the present.

Machine data allows you to look at data generated by computer hardware or software. This is increasingly important as our world becomes more and more technologically reliant.

Sensor data allows you to look at historical data from sensors, such as weather and climate data over time. q_itf2_datamodeling_concurrent

A medical supply company is using a spreadsheet to keep track of inventory. The company is rapidly expanding, and several employees now need to access the spreadsheet securely at the same time (concurrent use). However, each time one employee opens the spreadsheet, it's locked for use by any other employees.

Which of the following provides the BEST solution to resolve this issue? Answers:

• Switch to a cloud-based spreadsheet solution that allows multiple users to access the spreadsheet at the same time.

• *Switch to a database that allows for concurrent users and can support thousands of users accessing the data at the same time.


• Keep the current spreadsheet, but upgrade to a version that allows for multiple users to access the spreadsheet at the same time with the proper authorization.


• Purchase new spreadsheet software that allows multiple users to access the spreadsheet at the same time.


Explanation:

Databases allow thousands or even millions of users to access data at the same time without having to wait or take turns. Databases also have measures in place to make sure only authorized users can get to the data. Because the company is expanding and security is now a concern, switching to a database is the best solution.

Switching to a cloud-based spreadsheet can allow for multiple concurrent users but can be awkward for dozens or hundreds of concurrent users. It also does not provide the security that the medical supply company needs.

A spreadsheet upgrade may not provide multiple-use features, concurrent access to the same spreadsheet, or secure access features.

Purchasing a new spreadsheet that includes a concurrent use feature does not address security issues. It also does not address the expansion issues, as dozens or hundreds of employees might need to access the same spreadsheet at the same time.

q_itf2_datamodeling_database

Dana, an IT manager, is part of a transition team determining whether to keep the company's Excel flat file system for storing customer data or to switch to a database (such as PostgreSQL).

Which of the following would be a significant advantage of switching from Excel to a database for storing customer data?

Answers:

• A database is useful for transferring information between systems.


• A database is useful for tracking simple data, such as customer addresses.


• A database is difficult to secure with different users having different privilege levels.


• *A database makes analyzing a million records just as easy as analyzing a few hundred.


Explanation:

Databases can store thousands, millions, or even billions of data points. A good database makes analyzing a million records just as easy as analyzing a few dozen or hundreds.

Flat file systems are useful for such things as transferring information between systems.

Flat file systems are useful for tracking simple data, such as customer addresses or birthdates.

Databases have measure in place to make sure only authorized users can get to the data. Additionally, different users have different privilege levels. This is not the case with flat file systems.

q_itf2_datamodeling_database_02

Which of the following are reasons you would use a database to manage your data? (Select two.) Answers:

• *Store data securely.


• Protect data against social engineering threats.


• Provide a productivity software solution.


• *Generate data reports.

• Edit media files.


Explanation:

You can use a database to securely store your data as well as to generate valuable reports on that data.

Social engineering is the use of deception to gain personal and/or private information for unlawful purposes. Normally, databases are not designed to protect directly against social engineering threats.

Productivity software is used to perform common tasks in a business or home office, such as word processing, spreadsheets, presentations, web browsing, and visual diagramming. Databases are business software.

Media files include things like text, image, and sound files. Databases focus on organizing and storing files, not editing them.

q_itf2_datamodeling_persistence

Which of the following BEST describes the use of a database by the application? Answers:

• *Data persistence


• Data backup


• Database query


• Database input


Explanation:

Many applications need some place for their data to be stored so that it is not lost when the application is terminated. This storage is often referred to as data persistence.

Databases provide tools to back up information entered within seconds of it being committed. However, backup does not describe the need for an application to use a database.

A database query is a request to access data from a database for retrieval or processing. A query does not describe the need for an application to use a database.

Database input is a way to enter data into your database. It does not describe the need for an application to use a database.

q_itf2_datamodeling_privilege

Which of the following is a feature that provides for the security and integrity of the data in a database? Answers:

• *User privilege levels


• Data encryption


• Device passwords


• Anti-malware protection


Explanation:

Databases have measures in place to make sure only authorized users can get to the data. Additionally, different users have different privilege levels. While a top-level administrator can view and edit all the data, lower-level users may be able to see records but not change or delete them.

Data encryption is the process of translating data into an unreadable form that can only be deciphered if you have access to a secret key. It is not necessarily a database feature.

While a device password can restrict access to the database software on a computer, it does not directly impact the security of data in a database.

Anti-malware software can be installed on a computer system to detect and prevent malware infections. It is not a database feature.

q_itf2_datamodeling_scalability

Which of the following is a database concept that allows for storage and analysis for a few dozen to billions of data points?

Answers:

• *Scalability


• Storage


• Processing speed


• Concurrent use


Explanation:

Databases may store thousands, millions, or even billions of data points, which makes analyzing a million records just as easy as analyzing a few dozen. This feature is known as scalability, and this is what allows you to expand usage without increasing costs.

While databases provide storage for data points, storage alone does not indicate scalability from a few to billions of records.

While databases significantly increase processing speed (over flat files) for tasks such as data retrieval and analysis, processing speed does not indicate the ability to scale a database.

Concurrent use is a database feature that allows for more than one person to access a database at the same time. It does not indicate the ability to scale the database.

q_itf2_datamodeling_speed

Which of the following is an advantage of using a database over a flat file system? Answers:

• Software upgrades


• *Processing speed


• CSV files


• Imports and exports


Explanation:

Databases can store thousands, millions, or even billions of data points and analyze that data at a much faster processing speed than a flat file system (such as an Excel spreadsheet).

Both database and flat file system software vendors provide regular upgrades to their software.

CSV (Comma Separate Values) files are a type of file system data storage. This is not an advantage of using a database over a flat file system.

Importing and exporting data is a feature of both databases and flat file systems. q_itf2_datamodeling_table

A database can store a variety of data in each table. Which of the following is the BEST example of a variety of data within a table?

Answers:

• A table with integer, float, and decimal fields


• A string field that allows for numbers, characters, and punctuation


• A table with a variety of string fields


• *A table with date, purchase amount, and customer name fields

Explanation:

A table with date, purchase amount, and customer name fields represents a variety of data. This includes a date- formatted field, a number field for the purchase amount, and a text string field for the customer's name.

A table with integer, float, and decimal fields represents various types of number fields, not a variety of data. A string field, no matter what is entered, does not represent a variety of data.

A table with a variety of string fields does not represent a variety of data. q_itf2_dbms_01

What is the general term for software that creates and manages databases? Answers:

• Tables


• *DBMS


• Microsoft Access


• MySQL


Explanation:

A database management system (DBMS) is software that creates and manages databases. It acts as an interface between the raw data stored in the database and people who want to use or analyze the data.

Tables are the backbone of any database. Tables store the information that resides in a database. Microsoft Access and MySQL are specific DBMS programs.

q_itf2_dbms_02

Which database object is essentially questions that we can ask the database? Answers:

• *Queries


• Tables


• Forms


• Reports


Explanation:

Queries are essentially questions that we can ask a database.

Tables are the backbone of any database. Tables store the information that resides in a database. Forms provide a convenient way for users to enter data into their tables.

Reports provide aesthetic, printable summaries of data. They can be based on tables, queries, or both. q_itf2_dbms_03

Which of the following makes it easier for users to enter data into their tables? Answers:

• Queries


• Tables


• *Forms


• Reports


Explanation:

Forms provide a convenient way for users to enter data into their tables.

Queries are essentially questions that we can ask a database.

Tables are the backbone of any database. Tables store the information that resides in a database. Reports provide aesthetic, printable summaries of data. They can be based on tables, queries, or both. q_itf2_dbms_04

Which of the following DBMS programs is open source? Answers:

• SQL Server


• *MySQL


• Oracle Database


• Microsoft Access


Explanation:

MySQL is an open-source database management system (DBMS) distributed by Oracle since 1995. Many people who manage their own websites and databases prefer to use MySQL because it provides SQL database implementation that works well for small to medium-sized websites.

Microsoft SQL Server is a proprietary relational database management system developed by Microsoft that was released in 1989.

Oracle Database is a highly scalable, robust, industry-standard DBMS. It was released in 1980 by Oracle Corporation. Microsoft Access is a DBMS developed by Microsoft that works effectively to create and manage small relational databases with a few users. It was released in 1992 as part of the Microsoft Office suite.

q_itf2_dbms_05

Which of the following database objects provides a summary of data? Answers:

• Queries


• Tables


• Forms


• *Reports


Explanation:

Reports provide aesthetic, printable summaries of data. They can be based on tables, queries, or both. Queries are essentially questions that we can ask a database.

Tables are the backbone of any database. Tables store the information that resides in a database. Forms provide a convenient way for users to enter data into their tables.

q_itf2_dbms_creation

There are several processes related to database usage. Which of the following involves the information stored in a database, where the database is hosted, and how clients can access the data?

Answers:

• *Creation


• Queries


• Reports


• Storage

Explanation:

Database creation includes planning for which items to store in the database, where the database will be hosted, and how it will be accessed by clients.

Queries are used to extract information from a database. Using a query presupposes that the database is already created, hosted, and accessible.

Reports are a way of outputting database information into a formatted, easy-to-read document.

Storage is the amount of space on the database server that's allocated for storing data. While it might be a factor in planning for where the database will be hosted, it is not part of the database creation process.

q_itf2_dbms_import

A system manager has created a database to store company employees' personal information. What is the next step that the system manager needs to do?

Answers:

• Validate that the database has sufficient storage space.


• *Import (input) data records into the database.


• Test the database by extracting information using a query.


• Generate a report to make sure the database is working properly.


Explanation:

After creating a database, the next step is to import (input) data records into the database by providing an online form for employees to fill out or by importing records from another source (such as a CSV file).

Validating that a database has sufficient storage space is part of the creation process.

A query extracts information that already exists in a database. After initially creating the database, you still need to input data so the query has something to extract.

To generate a report, you need data records in the database. This does not happen during the creation process. q_itf2_dbms_persistent

Which of the following scenarios is an example of why an application or utility would need a database for persistent data storage?

Answers:

• *A customer fills out an online form to order a Bluetooth speaker.


• A business manager edits and saves a PowerPoint presentation.


• A system manager edits and saves a network device's configuration.


• A student creates and saves a graphic image.


Explanation:

After filling out an online order form and clicking Submit, the form is no longer available and does not store the order information. Instead, the ordering process relies on a database to store the submitted information.

The business manager editing a PowerPoint presentation would save the changes in a PowerPoint file, which does not require a database.

The system manager would save the network configuration to a configuration file, which does not require a database. The student would save the graphic image to a file, which does not require a database.

q_itf2_dbms_relational

Which of the following are basic architectural components of a relational database? (Select three.) Answers:

• *Tables


• Primary keys

• *Records


• Constraints


• XML


• *Fields


Explanation:

A relational database is highly structured. It has information organized into tables with several fields (represented by columns) and records (rows) that include each field in a column.

A primary key is a designated column in a table that helps to identify each record as unique and is not a basic architectural component.

A constraint is a field property that limits the value that can be entered into that field and is not a basic architectural component.

XML (Extensible Markup Language) is a markup language and not an architectural component of a relational database. q_itf2_dbms_report

Peter is a regional sales manager for an online clothing retail company. He would like information on all the customers in his region and the purchases made by each of them during the last quarter.

Which of the following database elements can BEST provide the information Peter needs? Answers:

• *Report


• Query


• Form


• Table


Explanation:

Reports provide clear, easy-to-read summaries of data. They can be based on tables, queries, or both. In this case, a report can be generated to list the customers in Peter's region along with all their purchases from the last quarter.

Queries extract information from database tables. Queries are part of the information gathering process. They are not the report itself.

Forms are a method of gathering information from users that can be input into a database. One of Peter's customers might use an online form to order a clothing item, and that information is most likely stored in the database. However, it would not provide output like a report would.

Tables form the backbone of any database and are used to organize data. A table would store the information that Peter needs. However, it would not provide output like a report would.

7.3 Relational Databases Section Introduction

As you study this section, keep the following questions in mind:

• What are some primary keys that databases use to identify me?


• What one-to-one, one-to-many, and many-to-many relationships do I encounter in a typical day?


• How does normalization improve a database?


After finishing this section, you should be able to:

• Describe the purposes of a relational database.

• Define basic relational database terminology, including fields, records, primary keys, foreign keys, and one-to-many relationships.


• Define the term normalization as it relates to storing and retrieving data.


• Answer basic questions about Microsoft Access table relationships.


• Perform the following database design tasks in Microsoft Access: o Create a table.


o Add fields to a table.


o Change the data type and size of a field.


o Set default field values.


o Create table relationships.


Key terms for this section include the following:

Term Definition


Relational Database

A database that holds data on multiple related tables.


Table

A data structure in a relational database that is comprised of fields (columns) and records (rows).


Field

A single attribute of each record in a table.


Record

A single instance of an entity stored in a database table.


Primary Key

A field in a table that uniquely identifies a record.


Foreign Key

A field that corresponds to the primary key field in another table.


Query

A method of asking questions about the data stored in a database.


Form

A graphical interface that allows users to query a database by filling in information on the form.


Report

An easy-to-read listing of the results of a query.

Normalization

A design technique that organizes data in a database in an optimal way. This results in it being easier to add, remove, and update data without introducing errors.


7.3.1 Relational Databases (Lesson Video) Transcript:

One of the most common types of database is the relational database, which stores data on multiple related tables. In this video, we'll learn some important relational database terminology and look at an example of a table relationship.

In spreadsheet applications, we talk about tables in terms of vertical columns and horizontal rows. However, we don't use these terms for database tables. Instead, we describe them as having fields and records. Rows are called records because all the information on a row belongs together. Since this is a table of people, each row is a record of an individual person. We call columns fields because each field has the same kind of information. Each record is the combination of all the fields in a table.

The next concept you need to understand is the Primary Key. Each table in a relational database has one field that's designated as the primary key field. The purpose of this field is to give each record a unique identifier. Pretend you're an administrator at a large company and you want to look up an employee named Michael Smith. Since this is such a common name, there may be more than one Michael Smith who works at the company. To make sure you find the Michael Smith you want, you could search for his Employee ID number, which is a primary key. Even though two employees may have the same name, each Employee ID is unique.

Here we have a table of people and another table with their phone numbers. One field on each of these tables is the primary key. As you can see, neither of the primary key fields have any repeated values. It's essential for each primary key to be unique. The phone table has a field that looks similar to the primary key field of the people table. This is called a foreign key. Notice that each number in this foreign key field corresponds to a primary key in this field. This is how a relational database creates relationships. In this case, the tables are related by the PersonID fields.

This kind of relationship between tables is called a one-to-many relationship. That's because even though each phone number can belong to only one person, each person can have many phone numbers.

We've just learned about relational databases. We discussed fields and records, primary and foreign keys, and one-to- many relationships. These concepts are foundational to understanding how databases work.

7.3.2 Relational Database Facts

Databases are electronic repositories of organized information. There are many kinds of databases. One of the most popular is the relational database, which organizes information into related tables.

This lesson covers the topic of relational database concepts. Relational Database Concepts

Relational databases work by linking fields from different tables to create complex and easily-searchable databases. Relational databases have many advantages over flat file databases, which typically store data in a single file in plain text format. Advantages include:

• Support for concurrent users.


• Scalability.


• Speed of access.


• Support for a variety of data types.


• Security through access control.


• Resiliency through tools for back up and replication.


• Flexibility in allowing user-defined actions.


• Ability to manage the information put in the database.

• Support for a variety of data, such as strings, numbers, and data fields.


The following table defines many concepts that are necessary for understanding how relational databases work. Table 1: Relational Database Concepts

Concept Description


Schema The


Table Tables


Query Querie


Form

Most database users don't write queries in query language directly. Instead, they enter


Report A


Primary key

Most records in a database require a way to distinguish them from other records. A


Foreign key

Often, a table in a database references records in another table. It does this by using the


Field

A field describes a single attribute of each re


Record A


SQL (S SQL


Table relationships

You may want to associate data in one table


7.3.3 Spreadsheets vs. Databases (Lesson Video) Transcript:

Spreadsheets are powerful tools for organizing, storing, and analyzing data. Most data professionals use spreadsheet software like Excel every day. Since spreadsheets are so useful, you may be thinking, "why do we even need databases? Why not just use spreadsheets for everything?" In this video, we'll look at some data in a spreadsheet, then look at the same data stored in a relational database.

This is a short telephone directory spreadsheet. We have columns for first and last names, and columns for three types of telephone numbers. This directory is fine for these few names, but if we were to add a few hundred more, we'd run into some serious problems. The first is that there are lots of blank cells. Not only do they make it harder to read, but blank

cells make it difficult to sort and filter the data. Another problem is that this table can only hold three types of phone numbers. If we wanted to store somebody's emergency contact number or even an alternate work number, we'd have to structurally alter the entire spreadsheet by adding a new column. This results in the spreadsheet being bigger, more complex, and harder to use.

Here's another approach to creating the directory with a spreadsheet. This time there are no blank cells, and we can easily add as many types of phone numbers as we need. However, this spreadsheet has even more problems than the last one.

First off, suppose we just want to see the list of people's names and aren't interested in the phone numbers. As you can see, we'd have to sort through a lot of duplicate data. Second, it's hard to change existing information. Let's say that Erica Nichols gets married and wants to change her last name. Using this spreadsheet, we'd have to change her

name three times, which makes it more likely that we'd make a mistake. Finally, this method makes it difficult to delete data. If Jeremy Baxter cancelled his cell phone service and we had to remove his number from the directory, we'd have to remove him from the directory entirely. This system doesn't allow us to delete his number but keep his name.

Now let's look at how we can solve these problems by using a database. Instead of having all our information on one table, we've divided it into two tables, one for names and another for phone numbers. You'll notice that each table has a column for ID numbers. The computer uses these numbers to match the people on this table with their phone numbers on the other table. Let's look at the advantages to this system. As you can see, there are no blank cells. Adding a new type of phone is as easy as typing it into this column. If we want a list of people without their phone numbers, all we have to do is look right here. If we want to change any information, we only have to do it in one place. Finally, this kind of directory makes it possible to delete someone's phone number while keeping the rest of their information intact. The best part is this database would be just as easy to use if we added a few thousand more people to it.

In this video, we compared spreadsheets with relational databases. Spreadsheets are amazing tools for data analysis and presentation. They can also be used effectively to store a small collection of data. However, if you need to store thousands of records, databases make it much easier to enter, modify, delete, and access the information you need.

7.3.4 Database Structure (Lesson Video) Transcript:

Building a successful database requires careful planning before you start creating tables and relationships. It's important to know what kinds of information you want to keep track of and how the relationships should look before you even make your first table. This general database structure is called a schema. In this video, we'll discuss the schema of a simple database for a local restaurant.

A helpful way to conceptualize a database is to divide it into three parts: resources, events, and agents. For a business database like this one, resources are the goods and services provided. For our restaurant, our products are our most important resource. Agents, simply put, are people. They're the ones who will produce or consume resources. Our restaurant has two main agents: customers and employees. Events are the way that agents and resources interact with each other. In a restaurant, an event occurs when a customer orders a product from an employee.

One of the benefits of finding our resources, events, and agents is that it makes it easy to know what tables to create. In this database, Products, Orders, Customers, and Employees should all have their own tables.

The next step in planning a database is to decide what fields should go into each table. Let's start by adding the field that all these tables need to relate to each other– the Primary Key. Next, we'll make fields for storing information. When creating fields, it's best to break your data down into the smallest chunks you can. Instead of making a field for names, make a field for first names and one for last names. This makes it easier to get data out of your database later.

In our product table, we'll obviously want a field to keep track of our products. We also want a field that says what kind of product it is – whether it's a burger, side, or drink. Finally, we want a field that stores the price of each product. We'll do the same thing with our tables in the Agents column, adding fields to store our customer and employee names. We could also add fields for other information, such as our employees' addresses. We'll just put the word "Address" here, but in a real database you'd want to make separate fields for street and number, city, state, and zip code.

Last of all, let's add the fields for our Orders table. This is the most important table in the database, and it's a little different from the others. Instead of having its own information, we want this table to combine information from the other tables. We do this by adding foreign key fields. These make it possible to bring information from the other tables together. We can also add new fields to this table. For example, let's add a field to record the date of each order.

In this video, we talked about database structure. We discussed resources, events, and agents; dividing tables into fields; and defining relationships.

7.3.5 Types of Relationships

In this lesson, we'll discuss three kinds of real-life relationships that can be modeled in a relational database. One-to-One Relationships

The simplest kind of relationship is a one-to-one relationship, where two entities or attributes share a unique connection with each other. ID numbers are a good example of this. Each student at a school has only one student ID number, and each ID number represents only one student.

One-to-One Relationship


One-to-one relationship example of a student ID to a student.

In a relational database, one-to-one relationships are generally represented by storing both items as fields in the same table.

7.3.6 Relational Methods (Lesson Video) Transcript:

For a database to function correctly, users need to be able to do four general tasks: add new information, access existing information, modify information, and delete information. An easy way to remember these is to use the acronym CRUD: create, read, update, and delete.

In this video, we'll take a closer look at a few common SQL commands, or methods, that offer CRUD functionality. We'll also look at methods for backing up data and controlling permissions.

The first set of commands we'll look at are part of what's called Data Definition Language, or DDL. These commands change the structure, or schema, of the database.

First, CREATE. This command can either begin a brand new database or add a new table to an existing database. Second, ALTER TABLE. This is used to add, change, or remove fields on an existing table. It also lets you define primary and foreign keys.

Third, DROP. This command deletes an entire table, including all the data stored in it.

Now, let's look at Data Manipulation Language, or DML. These commands have to do with the records within the database and not the schema itself.

First, INSERT. This command adds a new record, or row, to a database table.

Second, SELECT. This lets you view the specific information you want from the database. Third, UPDATE. This command makes changes to the records in a table.

Fourth, DELETE, which deletes records from a table.

With any kind of persistent storage, it's vital to create backups of your data. That way, if a disk fails, you don't lose all your valuable information. The BACKUP command creates a backup copy of the database. If the main database breaks down, the RESTORE command replaces the broken database with the working backup.

Another way to back up a database is to export the data to another kind of program, like a spreadsheet. This is called a database dump, which stores the database schema and data in a .CSV file.

Finally, let's talk about the GRANT and DENY commands, which are used to control permission levels for other users. For example, the command GRANT SELECT TO Joe gives Joe permission to run select queries in the database.

Similarly, DENY DROP TO Joe prevents Joe from dropping tables from the database.

In this video, we looked at SQL methods that offer CRUD functionality for relational databases. We looked at Data Definition Language, which deals with database structure, and Data Manipulation Language, which deals with records. We also looked at granting and denying permissions to other users.

7.3.7 Normalization (Lesson Video) Transcript:

In this video we'll learn about database normalization, which is a design technique that organizes data in an optimal way. Normalized databases make it much easier to add, remove, and update data without introducing errors.

We'll start by showing some non-normalized data, then apply normalization techniques to it. Keep in mind that everything you'll see are different ways to store the exact same data. As you watch, feel free to pause and examine any of the tables in detail so you can better understand what's going on.

This spreadsheet shows data for a few customers of a video streaming service. We have the name of each customer, the names of the movies they've viewed, and the genres of those movies. Right now, this data is not normalized at all. Data stored like this is prone to errors. For example, if we wanted to delete one of the views, we'd have to carefully delete the movie and its genre by hand, which makes it likely we'd introduce an error.

To store this data in a better way, we'll change the structure to match the normal forms. A normal form is a set of rules about how data is structured. You can think of them like a series of water filters. The first normal form, or 1NF, is like a rough filter for large objects like sticks and rocks. The second normal form, 2NF, is like a finer filter for sand and large particles. The third normal form, 3NF, is like a very fine filter that removes bacteria and harmful chemicals. Each normal form makes the database progressively more efficient and less redundant.

We'll start by putting our data into the first normal form. To be in 1NF, each cell should contain a single value, and each record, or row, must be unique. When we transform our data into 1NF, it looks like this. This is a little better than before, but we still have some issues. Two of our customers have the same name – Bill. To distinguish between them, we have to look at two columns. This table is also hard to update. If we want to change the spelling of David Bachman's name, we'd have to do it in three different places. We can solve these problems by moving into the second normal form.

To be in 2NF, data must meet all the requirements for 1NF. In addition, there must be a single field that contains a unique primary key for each record. Unfortunately, we can't do that with this table. Even if we give every person their own ID number, there are still repeated values in the primary key field. To make each value in the primary key column unique, we'll need to split the data into two tables. One table will have the information about people, and the other table will keep track of what movies they've viewed. Each record on both tables will have a unique primary key. Each number in this field represents a person, and each number in this field represents a person viewing a movie. Notice that the primary keys on this table correspond with the ID numbers in this table – this is called a foreign key. This row is the record of Maria watching Return of the King.

Finally, let's look at the requirements for the third normal form. To be in 3NF, data must meet all the requirements for 2NF. In addition, each field must be an attribute of the entity represented by the primary key. That'll make more sense after we look at some examples. We'll start by looking at the customers table. In this table, each primary key represents an actual person in the real world. These two fields, first name and last name, are both attributes of the person the number represents. Which means this table is already in 3NF.

Now let's look at the Views table. Each primary key in this table represents an event where a person watched a movie. Both of these fields are attributes of that event – they describe who watched the movie and which movie it was.

However, the genre field isn't an attribute of watching a movie – it's an attribute of the movie itself. To get into 3NF, we'll have to split the movies into their own table. Just like the Customers table, this new Movies table has a primary key for

each record, and the primary key represents the movie itself. Since title and genre are both attributes of the movie, this table is in 3NF.

Now we can look at our complete 3NF database. We have separate tables for customers and movies and a table that keeps track of which movies have been watched.

In this video we learned about database normalization, which is a set of rules for storing data efficiently. We saw examples of 1NF, 2NF, and 3NF.

7.3.8 Database Design in Microsoft Access (Demo Video) Transcript:

In this video, we'll show how to examine the tables and relationships in an Access database. Here on the left, we can see each of our tables. To open one, double-click it. From here, we can see each of the records stored in the table. Up here, we can click the View button to switch to design view. This lets us see additional information about our fields. In this table, CustomerID is the primary key, as designated by this key icon. We can also see the data type of each field over here. To close a table, click this x.

To view the relationships, go to the Database Tools tab and click Relationships. Each of these squares represents one of our tables. We can organize this diagram by dragging the tables around. These lines represent the relationships between the tables. For example, the Customers and Orders have a one-to-many relationship. This means a customer can have multiple orders, but an order is always associated with just one customer. The primary key on the customers table is linked to this foreign key field on the Orders table. To close the relationships diagram, click this x.

7.3.9 Database Design in Microsoft Access (Simulation) Scenario

The purpose of this lab is to help you become familiar with Microsoft Access tables and relationships. In this scenario, you are using an Access database to keep track of sales data.

Open various tables in the database and examine their fields and relationships. Then answer the following questions:

• The locations field on the Employees table is set to the          data type.


• Which of the following tables are related to the Orders table?


            is a foreign key field in the Products table.


Explanation

In this lab, you will explore tables and relationships in an Access database. You will then answer several questions:

• The locations field on the Employees table is set to the          data type.


• Which of the following tables are related to the Orders table?


            is a foreign key field in the Products table.


Complete this lab as follows:

1. View the data type of the locations field in the Employees table: a. In the left pane, right-click the Employees table and select Design View .


b. Notice the data type of the locations field.


c. Answer Question 1.


2. Determine which tables are related to the Orders table: a. On the Database Tools tab, in the Relationships group, select Relationships .


b. Click and drag the tables around on the Relationships tab to more clearly view their relationships.


c. Notice which three tables have one-to-many relationships with the Orders table.


d. Answer Question 2.


a. With the Relationships tab open, notice which field the Products table uses to store values from the primary key field in the ProductTypes table.


b. Answer Question 3.


3. Determine which field in the Products table is a foreign key:


7.3.10 Tables and Relationships (Demo Video) Transcript:

In this scenario, you'll work with Microsoft Access, a simple Database management system.

We'll start by creating a new table. Click the Create tab, then Table Design. Down here, we'll type our field names and assign their types. First, we want to make our primary key field. Type CustomerID into this cell and set its type to Autonumber. The autonumber type will automatically assign each new record a unique ID number. To make this field the primary key, click the Primary Key button.

Let's add two more fields. The first one should be called firstName, and the second should be called lastName. When you click the Data Type column, they will automatically be set as Short Text, which is what we want. To save these fields, click the save button at the top left corner of the screen. Change the name of the table to Customers, then click OK.

Next, we want to create a one-to-many relationship between the PhoneNumbers and Employees tables. Open the Database Tools tab, then click Relationships. Use this dialog box to add the two tables we want to the diagram. To create the relationship, drag the primary key field from the Employees table to its matching foreign key field on the

PhoneNumbers table. Check this box, then click Create.

7.3.11 Tables and Relationships (Simulation) Scenario

You're creating a database to keep track of employees and customers in a small company. In this scenario, you'll create a new table for customers, and create a relationship to link the table of employees with the table of employee phone numbers.

Perform the following tasks:

• Create a new table for customers. 1. At the top of the screen, click the Create tab, then click Table Design .


2. In the first row of the grid, set the field name as CustomerID and the data type as Autonumber . Click the Primary Key button at the top-left corner of the screen to make this field the primary key.


3. In the second row of the grid, set the field name as firstName and the data type as Short Text .


4. In the third row of the grid, set the field name as lastName and the data type as Short Text .


5. At the top-left corner of the screen, click the Save icon. Change the name of the table to Customers and click OK .


• Create a one-to-many relationship to link the Employees table to the PhoneNumbers table. 1. At the top of the screen, click the Database Tools tab, then click Relationships .


2. On the Show Table dialog box, double-click Employees and PhoneNumbers , then click Close .


3. Drag the EmployeeID field from the Employees table (primary key) to the EmployeeID field of the PhoneNumbers table (foreign key).


4. On the Edit Relationships dialog box, check the box next to Enforce Referential Integrity , then click Create .


Explanation

To complete this lab, do the following:

• Create a new table for customers. 1. At the top of the screen, click the Create tab, then click Table Design .


2. In the first row of the grid, set the field name as CustomerID and the data type as Autonumber . Click the Primary Key button at the top-left corner of the screen to make this field the primary key.


3. In the second row of the grid, set the field name as firstName and the data type as Short Text .


4. In the third row of the grid, set the field name as lastName and the data type as Short Text .


5. At the top-left corner of the screen, click the Save icon. Change the name of the table to Customers and click OK .


• Create a one-to-many relationship to link the Employees table to the PhoneNumbers table. 1. At the top of the screen, click the Database Tools tab, then click Relationships .

2. On the Show Table dialog box, double-click Employees and PhoneNumbers , then click Close .


3. Drag the EmployeeID field from the Employees table (primary key) to the EmployeeID field of the PhoneNumbers table (foreign key).


4. On the Edit Relationships dialog box, check the box next to Enforce Referential Integrity , then click Create .


7.3.12 Section Quiz (Section Quiz) q_itf_relationaldb_components

Information in a relational database is stored in tables. Which of the following are the primary architectural components of a table for storing database information? (Select two.)

Answers:

• Strings


• *Records


• Variables


• *Fields


• Forms


Explanation:

Tables are used to store information in a relational database. Each table is comprised of fields (columns) and records (rows).

A string is a data type used to store more than one character, such as a word or sentence. While a string can be stored in a table, it is not a primary architectural component.

A variable is a string in programming that represents a value that can change. It is not a primary architectural component of a table.

Forms are not the primary way to store database information in a table. q_itf_relationaldb_constraint

As a database administrator, you want to make sure that the Phone field in a record is not left blank by an employee filling in personal information.

Which of the following could you apply to the field to keep it populated? Answers:

• Primary key


• Schema


• *Constraint


• Form


Explanation:

Databases allow for a constraint to be applied to a field in a table. Constraints are limitations on the value that can be entered into the field. For example, you can add a constraint to make sure the field is never empty or to define the format of a telephone number.

While a primary key is a type of constraint, it would not prevent a field from being empty.

A schema is a database's general structure and defines the logical groupings and relationships between database objects, such as tables and fields. A schema does not provide for constraints on the value entered in a field.

A form is a way for users to input data into the database. It does not provide for constraints on the data itself in the database.

q_itf_relationaldb_facts_01

Match each database object on the left to its description on the right. Answers:

• Table


• Query


• Form


• Report


Explanation:

Tables store raw data in a database.

Queries retrieve information from the database. They can also add, edit, and remove data. Forms are user-friendly interfaces for working with a database.

Reports are formatted summaries of information in a database. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.6. q_itf_relationaldb_facts_02

Which of the following should not be used as a primary key in a table? Answers:

• *First name


• Employee ID


• Social Security number


• Username


Explanation:

Primary keys must always be unique values. Since many people can share the same first names, they would make poor primary keys.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.6. q_itf_relationaldb_facts_03

In a relational database table, rows are better known as          . Answers:

• *Records


• Fields


• Categories


• Instances


Explanation:

Rows in databases are known as records. Each record has information from each database field. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.6. q_itf_relationaldb_facts_04

In a relational database table, columns are better known as            . Answers:

• *Fields


• Records


• Categories


• Instances


Explanation:

Columns in databases are known as fields. Each field contains a specific type of information about each record. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.6. q_itf_relationaldb_facts_05

A value that's used to identify a record from a linked table is called a            . Answers:

• *Foreign Key


• Primary Key


• Linked Key


• Borrowed Key


Explanation:

When a primary key from one table is used as a field value in another linked table, it's called a foreign key. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.6. q_itf_relationaldb_facts_06

Alberto works in human resources and wants to move all personnel files to a system that would provide a user interface for adding, updating, and removing personnel records. He also wants to ensure the data cannot be viewed without correct permissions. Which of the following would be the BEST option to store and retrieve this data?

Answers:

• *Database


• Text-based flat file


• Network share


• Cloud storage


Explanation:

A database is the best choice to store personnel information and provide access control permissions. A text-based flat file would not provide the needed access control.

A network share and cloud storage would only provide a storage location for the data and would not provide the necessary user interface and functionality.

q_itf_relationaldb_facts_07

A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?

Answers:

• *Primary key


• Foreign key


• Public key


• Private key


Explanation:

Most records in a database require a way to distinguish them from other records. This unique identifier is called a primary key. Primary keys are usually numbers, but they can be any unique value. If you have a driver's license, the license number is a primary key. Even though other people may share your same first and last name, nobody else shares your license number.

A foreign key is when a table uses a primary key from another table. Public and private keys are used by encryption methods. q_itf_relationaldb_facts_08

A small business wants to persistently store customer feedback and product feature requests. The business also wants to be able to index and sort the information by priority. Which of the following would be the BEST option to track this information?

Answers:

• *Database


• Flat file


• SSD


• Memory


Explanation:

A database would allow the business to store the customer feedback and product feature requests persistently. Databases also provide the capability to index and sort the information.

A flat file would persistently store the data but does not provide the ability to index and sort the data. An SSD provides persistent storage but does not provide any of the other requirements.

Memory is not persistent storage and also does not meet any of the other requirements. q_itf_relationaldb_facts_09

Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application.

Which of the following database features would work BEST to accomplish this? Answers:

• *Query


• Report


• Form


• Table

Explanation:

A query will result in information that resembles a spreadsheet with rows and columns. A report would format the data in a human readable format.

A form is used to automatically build a query to retrieve database records. A table is used to store information in a database. q_itf_relationaldb_facts_10

Which of the following database features would provide a formatted, easy-to-read listing of the results of a query? Answers:

• *Report


• Form


• Record


• SQL command


Explanation:

A report is a formatted, easy-to-read listing of the results of a query. Without reports, query results would resemble a spreadsheet. When you search for an online video and are presented with a list of relevant options, the list is a report. Most database users don't write queries in query language directly. Instead, they enter information into a form which then builds the query automatically.

A record is a single instance of a thing stored in a database table. SQL commands are used to interact with a database. q_itf_relationaldb_facts_11

A NOT NULL        is a rule that prevents certain fields in a database from being left blank. Answers:

• *constraint


• schema


• query builder


• scalability


Explanation:

A NOT NULL constraint prevents users from leaving certain fields or columns blank when creating or modifying records in a table. Blank fields contain NULL values.

The general database structure is called a schema.

A query builder is a method of accessing a database using a graphical user interface that allows users to select what actions they want to perform on a database.

Scalability is a general characteristic of databases that allows data to be modified and users to be added without impacting the accessibility and performance of the database.

q_itf_relationaldb_facts_12

A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?

Answers:

• *The data can be organized into separate tables that are related to each other.


• The data is stored as a single file for quick retrieval.


• The data can be stored as unstructured data.

• The data can be saved as a flat file.


Explanation:

One of the key advantages of using a relational database is that the data can be stored in separate tables and a relationship established between tables. For example, the customer data for a customer is only stored once. Each time that customer places an order, the order goes into the orders table and the customer ID is stored with the order. The customer ID establishes a relationship with the customer table that contains a unique customer ID for each customer. Relational databases use multiple files instead of a single file to store data.

Relational databases typically store data as structured data. Non-relational databases utilize unstructured data.

A flat file is one way to store data, but relational databases do not use a flat file, such as a single text or binary file. q_itf_relationaldb_facts_13

Marty, a database administrator, has added a foreign key to a table in a database. Which of the following describes the purpose of a foreign key?

Answers:

• *For one table to reference records in another table.


• To provide a way to distinguish records within a table.


• To allow the storage of unstructured data.


• For one database to reference another database.


Explanation:

A foreign key is used when a table in a database will reference records in another table. They do this by using the primary key value of the record they want to reference. When a table uses a primary key from another table, it's called a foreign key.

Most records in a database require a way to distinguish them from other records. This unique identifier is called a primary key.

While databases can be designed to store unstructured data, primary keys and foreign keys are typically associated with relational databases, which store structured data.

Database queries can reference tables from multiple databases. But cross-database queries are not the purpose of foreign keys.

q_itf_relationaldb_field

Patricia, a database system manager for a large hotel chain, is setting up a relational database to track customer hotel registrations for each hotel. The table in the database currently includes fields (columns) for First Name, Last Name, Phone, Email, License Plate #, and Check-in Date.

What can Patricia do to make sure that each record (row) in the database is unique? Answers:

• Designate the Phone field as the primary key.


• Designate the License Plate # field as the primary key.


• *Create an additional Check-in ID field.


• Combine the Email field and the Phone field to use as the primary key.


Explanation:

The additional Check-in ID field could contain a unique ID number for each check-in. It could serve as a primary key. If a customer regularly uses the same hotel, the phone number could be duplicated in several records, and Patricia would not be able to use the column as a primary key.

If a customer regularly uses the same hotel, the License Plate # field could be duplicated in several records, and Patricia

would not be able to use the column as a primary key.

Only one field (column) can be designated as a primary key. q_itf_relationaldb_foreign

Which of the following BEST describes a foreign key in a relational database? Answers:

• A second primary key in a table that can be referenced from other tables


• A record (row) in a table that is imported from another table in the database


• *A primary key referenced by one table from a record in another table


• A record (row) in a table that is designated as a unique identifier


Explanation:

Often, a table in a database references records in another table. It does this by using the primary key value of the record it wants to reference. When a table uses a primary key from another table, it's called a foreign key.

There is only one primary key that can be designated in a table.

While data from one table can be referenced in another table using a foreign key, the data is not imported from one table to another.

A foreign key references a field (column) and not a record (row). q_itf_relationaldb_permissions

Which of the following BEST describes the permissions a user has for a database object after creating the object while logged into their user account?

Answers:

• The object's creator is limited to permissions given by the GRANT command.


• The object's creator has all permissions for the object, except those limited by the DENY command.


• The object's creator can deny permissions to the object for other user accounts.


• *The object's creator has complete control over that object.


Explanation:

When a logged-in user creates a database object, the logged-in user account maintains complete control (all permissions) over that object and cannot be denied that control.

While the GRANT command can be used to control the permissions for a user account, it cannot be used to limit the permissions for a database object created by that user.

While the DENY command can be used to limit the permissions for a user account, it cannot be used to limit the permissions for a database object created by that user.

Simply being the creator (owner) of a database object does not give you the ability to control access to the object for other user accounts. You need to be a database administrator (or on a user account with administrative rights) to set permissions for other user accounts.

q_itf_relationaldb_sql

Which of the following are the fundamental types of relational methods associated with Structured Query Language (SQL)? (Select two.)

Answers:

• *Define the database structure


• Increase the storage space for the database


• Back up the data in a database

• *Manage information in the database


• Upgrade the database software


Explanation:

An RDBMS (Relational Database Management System) often uses SQL (Structured Query Language) relational methods to create or define database structure and manage the information in the database.

Increasing the storage space for a database is a hardware upgrade and not a relational method type. Backing up the data in a database is a critical procedure, but it is not a relational method type.

Upgrading the database software can be important for fixing bugs and adding new features, but it is not a relational method type.

7.4 Querying Databases Section Introduction

As you study this section, keep the following questions in mind:

• What kinds of database queries do I already use?


• What is the relationship between queries and CRUD (Create, Read, Update, Delete)?


After finishing this section, you should be able to:

• Compare and contrast different methods of accessing data from a database.


• Describe the purpose of basic SQL commands.


• Interpret simple SQL queries.


• Answer basic questions about existing Microsoft Access queries.


• Use Microsoft Access to perform basic queries on a database.


• Write SQL commands to do the following: o Retrieve all data from a particular table.


o Retrieve table data that matches certain criteria.


o Add a new record to an existing table.


o Delete a record from a table.


Key terms for this section include the following:

Term Definition


Query

A command sent to a database. Queries are most commonly used for CRUD operations (create, read, update, delete).


Direct Access

A method of accessing a database directly using the database management system itself.

Query Builder

A method of accessing a database using a graphical user interface that allows users to select what actions they want to perform on a database.


User Interface Access

A method of accessing a database using forms that allow users to interact with the database.


Programmatic Access

A method of accessing a database using custom computer programs.


SQL

A computer language that makes relational databases work.


Data Definition Language (DDL)

Database commands that change the structure, or schema, of the database.


Data Manipulation Language (DML)

Database commands that modify the records within the database and not the schema itself.


7.4.1 Database Access Methods (Lesson Video) Transcript:

In this video, we'll look at several ways to access information in relational databases.

First, is direct access. This is where a database administrator connects directly to their database management software. From here, they can write SQL commands to create new databases and interact with existing databases.

Sometimes, a person may need to interact with a database but not know how to write SQL commands. Instead, they may use a query builder. A query builder provides a graphical user interface where people can select what actions they want to perform. Then, the builder translates the user's choices into SQL commands and runs them.

For some databases, most users won't ever need to interact with the data directly. Instead, they fill out information on a form. A SQL query gets the information from the form and uses it to send a command to the database. Then, the results of the query are formatted as an easy-to-read report and sent back to the user. When you log onto your bank account or search for a library book, you're accessing a database through a user interface.

Humans aren't the only ones who need access to databases; many computer programs need it too. Developers can write code into their software that reads, writes, updates, and deletes database records programmatically.

In this video, we looked at four ways to interact with databases: direct access, query builders, user interfaces, and programmatic access.

7.4.2 Database Access Facts

The table below summarizes four ways of accessing information in relational databases. Table 1: Database Access Types

TYPE DESCRIPTION


Direct Access

Database management systems give administrators direct access to their databases. From here, they can write SQL commands to create new databases and interact with existing databases.


Query Builder

A query builder provides a graphical user interface where people can select what actions they want to perform on a database. Then, the builder translates the user’s choices into SQL commands and runs them. This is helpful when a person may need to interact with a database but doesn't know how to write SQL commands.


User Interface Access

For some databases, most users won’t ever need to interact with the data directly. Instead, they fill out information on a form. A SQL query gets the information from the form and uses it to send a command to the database. Then, the results of the query are formatted as an easy-to-read report and sent back to the user. When you log onto your bank account or search for a library book, you’re accessing a database through a user interface.


Programmatic Access

Humans aren’t the only ones who need access to databases; many computer programs need it too. Developers can write code into their software that reads, writes, updates, and deletes database records programmatically.


7.4.3 Introduction to Queries (Lesson Video) Transcript:

Whether you're running a business, working on your education, or planning your next vacation, you need to have reliable access to information if you want to make informed decisions. Fortunately, databases are an excellent way to store a huge amount of data – more than you could ever possibly use. However, having access to millions of records isn't helpful unless you have a way to sift through it and find the specific information you need. To do this, we use queries. A query is kind of like asking a database a question, which it answers by giving us back the data we're looking for. Let's look at an example.

This is the Internet Movie Database. It contains millions of records about movies, tv shows, actors, directors, and producers. To get information about a specific topic, we can type a search term here. When we press enter, the website gives us a page of resources that match our search.

On our end, all we see is the search page taking us directly to the results. However, there's a lot more going on behind the scenes. When we type a search term and press enter, the computer takes what we wrote and translates it into a query language, such as SQL. Then, it takes the query to the database and uses it to find all the records that match the search criteria. Once it has them, it organizes them into a nice-looking report, which it puts up on the screen.

In this video, we took a first look at database queries. Using queries, we can transform the raw data stored in database tables into useful information that we can use to make informed decisions.

7.4.4 Microsoft Access Queries (Demo Video) Transcript:

In this video, we'll learn how to examine queries in Access. Here in the left pane we can see our saved queries. To open a query, double-click it. Queries open in datasheet view, where we can view the results of the query. To see what's going on behind the scenes, use this button to switch to design view.

Up here, we can see the tables that are involved in this query. At the bottom, we can see which fields are being used. This query shows the locations from the employees table, the total orders of each location from the orders table, and the total price of each order from the products table.

This page is really just a graphical representation of a SQL query. To view the actual SQL, use this button to change into SQL view. To close a query, click this x.

7.4.5 Microsoft Access Queries (Simulation) Scenario

The purpose of this lab is to help you become familiar with Microsoft Access queries. In this scenario, you are using an Access database to keep track of sales data.

Open various queries in the database and examine their results. Then answer the following questions:

• The Employee Phone Numbers query selects records from        table(s).


• The Products Under $2 query uses which of the following SQL keywords?


• In the Total Sales by Product query, the Number Sold field counts records from the          table.


Explanation

In this lab, you will explore queries in an Access database. You will then answer several questions:

• The Employee Phone Numbers query selects records from        table(s).

• The Products Under $2 query uses which of the following SQL keywords?


• In the Total Sales by Product query, the Number Sold field counts records from the          table.


Complete this lab as follows:

1. View the records selected from the Employee Phone Numbers query: a. In the left pane, right-click the Employee Phone Numbers query and select Design View .


b. In the bottom pane, notice how many different tables include fields that are selected by the query.


c. Answer Question 1.


2. View the SQL command used in the Products Under $2 query: a. In the left pane, double-click the Products Under $2 query.


b. On the Home tab, in the Views group, open the View dropdown and select SQL View .


c. Notice they keywords used in the SQL command.


d. Answer Question 2.


3. Examine the Number Sold field in the Total Sales by Product query: a. In the left pane, right-click the Total Sales by Product query and select Design View .


b. In the bottom pane, examine the third column in the second row and notice which table is counted by the Number Sold field.


c. Answer Question 3.


7.4.6 Create Queries for a School Database (Demo Video) Transcript:

In this scenario, we'll create a query that shows all the grades in a school that are lower than 70. We'll use Microsoft Access, a simple database management system.

To start, click Create, then Query Design. Since this query will use information from all three tables, add them all to the diagram. We can add fields to our query by double-clicking them. First, double-click the firstName and lastName fields on the Students table. They appear in this grid down here. Next, add the courseName field from the Courses table, then the grade field from the Enrollments table.

Let's run the query to see the results so far. Right now, it's showing all of the school's grades. To show only the grades below 70, we need to add some criteria. Click View to go back to design view.

Down here, click into the criteria row for the Grade field and type less than 70. If we run the query now, we see only the grades lower than 70. Click save and name the query Grades Under 70.

7.4.7 Create Queries for a School Database (Simulation) Scenario

You're an administrator at a small community college. You're building an Access database to keep track of students, courses, and grades. In this scenario, you've already created tables for your data, defined relationships between the tables, and filled the tables with data.

Now you're ready to create queries to help you analyze and make sense of your data. Perform the following task:

1. Create a query to show all grades below 70. This query should include the first and last name fields from the Students table, the courseName field from the Courses table, and the Grade field from the Enrollments table. Save this query and name it Grades Under 70 .


Remember to SAVE your query or you won't receive credit. Explanation

To complete this lab, do the following:

• Create a query to show all grades below 70. 1. On the Create tab, in the Queries group, click Query Design .


2. Using the Show Table dialog box, add all three tables to the relationships diagram, then close the dialog box.


3. Double click the firstName and lastName fields on the Students table to add them to the query.


4. Double click the courseName field on the Courses table to add it to the query.


5. Double click the Grade field on the Enrollments table to add it to the query.


6. On the Criteria row of the design grid, type <70 for the Grade field.


7. Click Save . Name the query Grades Under 70 and click OK .


7.4.8 SQL (Lesson Video) Transcript:

SQL, or Structured Query Language, is the computer language that makes relational databases work. Almost any time you've searched for something online, including search engines, video streaming services, and store catalogs, the computer used SQL to find the data you were looking for and display it in the correct order. In this video, we'll look at an example of how a typical database uses SQL to find information.

This is the advanced search form for a library catalog. Let's use this form to find all the library's Encyclopedia Brown books. We'll add the word Encyclopedia to the title field, the name Donald J. Sobol to the author field, then click Advanced Search. We're taken to the results page, where we can find all the books in the library that match the search terms.

Now, let's see how SQL worked behind the scenes to perform the search. All the library's books are stored in a relational database. The books table may look something like this. Each book has an ID, a title, an author, a publication year, and several other fields. This example table is small, but the actual library has thousands and thousands of records.

First, let's see how SQL could select a single field from this table. This command [SELECT Title FROM Books] would return the entire title field from the books table, giving a list of all the books in the database. To select two fields, you can add a comma. This command [SELECT BookID, Title FROM Books] would return the ID and Title fields. To select the entire table, SQL uses an asterisk. This command [SELECT * FROM Books] returns the entire table.

To search for specific records in the table, such as specific titles and authors, SQL uses the WHERE clause. Let's start with the command we just saw [SELECT * FROM Books], which returns the entire Books table. Now let's specify that we only want to select the book with an ID of 5. We can do that by adjusting our command to look like this [SELECT * FROM Books WHERE BookID=5]. This command selects everything from the books table that has an ID of 5, which is just one book.

Now let's go back to our original example. We want to find all the books where the title contains the word Encyclopedia. Since encyclopedia isn't the only word in the title, we'll need to use the LIKE condition. So, the syntax would look like

this [SELECT * FROM Books WHERE Title LIKE ‘%Encyclopedia%']. The percent sign is called a wild card, which means the query will select anything that contains the word encyclopedia, and it doesn't matter what comes before or after the word. As a final step, let's add the author to the search. [SELECT * FROM Books WHERE Title LIKE ‘%Encyclopedia%' AND Author = ‘Sobol, Donald J.'] This is the query we sent at the beginning of the video. When we get the results back, we have all the books that have the word Encyclopedia in the title that were written by Donald J. Sobol. Now, the website can format it into a nice-looking report so we can see the books.

We've just taken a first look at Structured Query Language. SQL is a powerful tool for working with large relational databases.

7.4.9 Basic SQL Commands

Structured Query Language (SQL) is a computer language that makes relational databases work. A query language is a programming language created to add to, change, or search the datasets within a database.

Any time you've searched for something online using search engines, video streaming services, or store catalogs, the computer almost certainly used SQL to find what you were looking for.

For a database to function correctly, users need to be able to do four general tasks: add new information, access existing information, modify information, and delete information. An easy way to remember these is the acronym CRUD (create, read, update, and delete).

The following tables define a few of the most common SQL commands. Data Definition Language Commands

This first set of commands are part of the data definition language (DDL). These commands change the structure (schema) of the database.

Table 1: Data Definition Language Commands Command

Description


CREATE TABLE

The CREATE TABLE command can add a new table to an existing database. Example : CREATE TABLE books ( id int, title text ); Creates a new table with two fields—an integer field for the primary key and a text field for the title.


ALTER TABLE

ALTER TABLE is used to add, change, or remove fields on an existing table. It also lets you define primary and foreign keys. Example : ALTER TABLE books ADD author text; Adds a new text field to the books table to store the author of each book.


DROP TABLE

The DROP TABLE command deletes an entire table, including all the data stored in it. Example : DROP TABLE books; Deletes the books table and all its records from the database.


CREATE DATABASE

The CREATE DATABASE command allows you begin a brand-new database. Example : CREATE DATABASE library; Creates a new database using only one parameter.


CREATE VIEW

The CREATE VIEW command creates a virtual table populated from an SQL statement result-set. Example : CREATE VIEW book_authors AS

SELECT column1, column2, ... FROM books

WHERE junior_fiction; Displays a table with book authors from the junior fiction category.


CREATE INDEX

The CREATE INDEX command creates an index within a table which can be used to accelerate the speed of query retrieval time. Example : CREATE INDEX book_copyrightdate

Command Description


ON books (column1, column2, ...);

Creates an index for copyright dates from the books table.


Data Manipulation Language Commands

The following table shows a few Data Manipulation Language (DML) commands. DML deals with the records within the database and not the schema itself.

Table 2: Data Manipulation Language Commands Command

Description


INSERT INTO and VALUES

These commands work together to add new records to an existing table. The INSERT INTO command tells the database which table should store the new record. VALUES tells the database what to write in each field. Example : INSERT INTO books (id, title, author) VALUES (12345, "The Cat in the Hat", "Dr. Seuss") Adds The Cat in the Hat to the books table.


SELECT

The SELECT command lets you view the specific information you want from the database. It's commonly used with the asterisk (*) operator, which tells the computer to include everything. Example : SELECT * FROM books Returns all records from the books table


WHERE

The WHERE command lets you narrow your query to only the results you want. Example : SELECT * FROM books WHERE author = "Dr. Seuss" Returns all records from the books table where the value of the author field is Dr. Seuss.


UPDATE and SET

The UPDATE command makes changes to existing records in a table. It's usually used with the SET command, which tells the database the changes to make. Example : UPDATE books SET title = "Green Eggs and Ham" WHERE id = 2345 Finds all records with an id of 2345 (probably just one book) and changes the value of the title field to Green Eggs and Ham.


DELETE

The DELETE command deletes records from a table. Example :


Command Description


DELETE * FROM books WHERE id = 2468 Deletes all records from the books table where the value of the id field is 2468. Using the primary key field is a good way to make sure you don't accidentally delete a wrong record.


Data Control Language and Other Common SQL Commands

This following table describes other common SQL commands that deal with backing up and restoring databases, as well

as managing permissions. It's important to note that the SQL permissions are how the objects in the database are kept secure.

When an object is created, the creator of the object becomes the owner of the object. The owner has the ability (through permissions) to grant rights to specific objects, tables, or columns to other users. Even if other users are granted rights, the owner retains complete control of the object.

Table 3: Other Common SQL Commands Command

Description


BACKUP DATABASE

The BACKUP DATABASE command creates a backup copy of the database. Example : BACKUP DATABASE library TO DISK = "C:\Users\student\Desktop" Backs up the entire database to the desktop. (Many relational database management systems also provide stored procedures to backup individual tables.)


GRANT

The GRANT command gives a user specified permissions to a specific database object and is part of the data control language within SQL. Example : GRANT SELECT ON books TO marian; Gives the user marian permission to run select queries on the books table.


REVOKE

The REVOKE command removes the specified permissions to specific database objects and is also part of the data control language within SQL. Example : REVOKE DROP ON books FROM marian; Makes it so the user marian can't drop the books table.


Database Dump

Another way to back up a database is to export the data into a format that can be read by another program like a spreadsheet. This is called a database dump. It typically stores the database schema and data in a CSV file. The command syntax for exporting and importing a database dump depends on the database platform you are using.


7.4.10 Writing SQL Commands (Demo Video) Transcript:

In this video, we'll learn how to use the SQL drag-and-drop activities. Over here, we have two tabs. The first tab shows an incomplete SQL statement, and the second tab shows the table the SQL query will select from. To complete the SQL statement, drag these words into the spaces. If we press Execute, we can see the results of the query. If you need a hint, click here to turn on the debugger. This will provide a hint if you mouse over the exclamation point.

You can also click the button at the bottom of the instructions to view what the final output of the query should look like. Feel free to experiment with different options and execute variations of the code to see what happens – you can always go back to the beginning by clicking Reset. When you're done experimenting and think you have the right answer, click Score.

7.4.11 SQL: Select All Records in a Table (Simulation) Scenario

The database in this example includes a table that stores employee records. In addition to first and last names, the people table stores the department and branch where each person works. To complete this lab:

• Create a SQL query that selects all the records in the people table.


Explanation

From left to right, the correct draggables are:

1. *


2. people

7.4.12 SQL: Select Records with a Single Condition (Simulation) Scenario

The database in this example includes a table that stores employee records. In addition to first and last names, the people table stores the department and branch where each person works. To complete this lab:

• Create a SQL query that selects all the records for employees at the East branch and excludes all other employees.


Explanation

From left to right, the correct draggables are:

1. WHERE


2. "East"


7.4.13 SQL: Select Records with Multiple Conditions (Simulation) Scenario

The database in this example includes a table that stores employee records. In addition to first and last names, the people table stores the department and branch where each person works. To complete this lab:

• Create a SQL query that selects all the records for Accounting employees at the Central branch and excludes all other employees.


Explanation

From left to right, the correct draggables are:

1. WHERE


2. AND


7.4.14 SQL: Add a New Record to a Table (Simulation) Scenario

The database in this example includes a table that stores employee records. In addition to first and last names, the people table stores the department and branch where each person works. To complete this lab, create a SQL query that will add a record for the following new employee to the people table.

• employeeID: 123456


• firstName: Jaime


• lastName: Rigby


• department: Support


• branch: West


Note: The new record will appear at the bottom of the output table. Explanation

From top to bottom, the correct draggables are:

1. INSERT (left)


2. people (right)


3. VALUES

7.4.15 SQL: Delete a Record from a Table (Simulation) Scenario

The database in this example includes a table that stores employee records. In addition to first and last names, the people table stores the department and branch where each person works. To complete this lab:

• Create a SQL query that deletes Dana Schwartz's record (the top record) from the people table and leaves all other records intact.


Explanation

From left to right, the correct draggables are:

1. DELETE


2. employeeID = "106366"


7.4.16 Section Quiz (Section Quiz) q_itf_dbaccess_facts_01

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?

Answers:

• *Query builder


• Direct access


• Programmatic access


• User interface access


Explanation:

A query builder provides a graphical user interface where people can select what actions they want to perform. Then, the builder translates the user's choices into SQL commands and runs them.

Direct access utilizes SQL commands to access the database.

Programmatic access is for non-human access to the database through a programming language.

User interface access is typically performed though the use of database forms that create an SQL query to retrieve data from the database. There are no forms available to Gina.

q_itf_dbaccess_facts_02

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

Answers:

• *Programmatic access


• Query builder


• Direct access


• User interface access


Explanation:

Programmatic access is for non-human access to the database through a programming language. Developers can write

code into their software that reads, writes, updates, and deletes database records programmatically.

A query builder provides a graphical user interface where people can select what actions they want to perform. Then, the builder translates the user's choices into SQL commands and runs them.

Direct access utilizes SQL commands to access the database.

User interface access is typically performed though the use of database forms that create an SQL query to retrieve data from the database.

q_itf_dbaccess_programmatic

David is running a Microsoft SQL Server database that provides an ODBC (Open Database Connectivity) driver that allows applications to access database management systems (DBMSs) using SQL commands. The database setup stores employees' personal information used by Human Resources and company managers.

In addition to the database setup, David has provided an application that lets employees modify their personal information. The application utilizes the ODBC and SQL commands to make changes to the employee records in the database.

Which combination of database access methods reflects the environment David has configured to store and manage employees' personal information?

Answers:

• Programmatic access and direct access


• *Programmatic access and user interface access


• Query builder and programmatic access


• Direct access and query builder


Explanation:

Programmatic access allows an application to interact with a database using SQL commands, and the application provides user interface access to allow employees to fill in forms without interacting directly with the database.

While programmatic access allows an application to interact with a database using SQL commands, direct access is limited to administrators using SQL commands for interaction. However, in this example, the application is using user interface access for employees.

While a query builder does give users the ability to modify data without using SQL commands, it is limited to selecting actions (using point/click and drag-and-drop) to create SQL queries for the database. In this example, however, the application is using user interface access to allow employees to modify content in the database.

q_itf_dbaccess_query

An IT administrator wants to provide a graphical interface tool for company sales representatives to quickly find product information and pricing in a relational database (without using SQL commands).

Which of the following would provide the type of access the sales representatives need? Answers:

• DBMS (database management system)


• Collaboration software


• *Query builder


• User interface access


Explanation:

A query builder provides a graphical user interface where people can select which actions they want to perform on a database. Then, the builder translates the users' choices into SQL commands and runs them. In this scenario, a query builder would be exactly what the sales representatives need to find the information they're after.

A DBMS (database management system) gives administrators direct access to their databases through SQL commands. They can perform tasks such as creating new databases and interacting with existing databases. It would not be a tool

that the sales representatives could use to interact with the database.

Collaboration software facilitates the sharing, processing, and management of files, documents, and other data between members of a team. It does not include database access through a graphical user interface.

User interface access is a database access type that allows users to manage a database's content through forms. However, the sales representatives do not need to change any product information. They simply need to query the database to retrieve information.

q_itf2_sql_01

What is the computer language that makes relational databases work? Answers:

• Java


• C++


• *SQL


• Python


Explanation:

SQL, or Structured Query Language, is the computer language that makes relational databases work. None of the other languages are used in relational databases.

q_itf2_sql_02

Which command is used to add, change, or remove fields on an existing table? Answers:

• CREATE TABLE


• DROP TABLE


• INSERT INTO


• *ALTER TABLE


Explanation:

The ALTER TABLE command is used to add, change, or remove fields on an existing table. It also lets you define primary and foreign keys.

The CREATE TABLE command can either begin a brand-new database or add a new table to an existing database. The DROP TABLE command deletes an entire table, including all the data stored in it.

The INSERT INTO command tells the database which table should store new records being added. q_itf2_sql_03

Mary needs to view all records from the Clients table. Which command should she use? Answers:

• SELECT ^ FROM Clients


• WHERE * FROM Clients


• *SELECT * FROM Clients


• WHERE ^ FROM Clients


Explanation:

The correct syntax for viewing all records from a table named Clients is SELECT * FROM Clients. The * signifies selecting everything in the specified table.

SELECT ^ FROM Clients is not correct as ^ is not a valid SQL operator.

The WHERE command lets you narrow down the query to specific results within the table. q_itf2_sql_04

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use? Answers:

• SELECT ^ FROM Clients WHERE name = Travis


• *SELECT * FROM Clients WHERE name = Travis


• UPDATE * FROM Clients WHERE name = Travis


• SELECT Travis FROM Clients


Explanation:

SELECT * FROM Clients WHERE name = Travis is the correct answer because to view a record containing specific terms, use the WHERE command with the SELECT command.

SELECT ^ FROM Clients WHERE name = Travis is not correct because ^ is not a valid SQL operator.

UPDATE * FROM Clients WHERE name = Travis is not correct because the UPDATE command makes changes to existing records in a table.

SELECT Travis FROM Clients is not correct as it does not follow any proper SQL syntax. q_itf2_sql_05

Which SQL command is used to give a user permission to a specific database object? Answers:

• REVOKE


• UPDATE


• VALUES


• *GRANT


Explanation:

The GRANT command is used to give a user permission to a specific database object. The REVOKE command removes certain permissions for specific database objects.

The UPDATE command makes changes to existing records in a table.

The VALUES command tells the database what to write in each field when adding new records to an existing table. q_itf2_sql_06

Which process exports a database into a format that can be read by another program like a spreadsheet? Answers:

• Database backup


• *Database dump


• CSV


• CRUD


Explanation:

A database dump is another way to back up a database by exporting the data into a format that can be read by another program like a spreadsheet. The command syntax for exporting and importing a database dump depends on the database platform you are using.

A database backup creates a backup copy of the database. This backup can only be read by the same program that created it.

CSV is a file type that a database dump can be exported to.

CRUD is an acronym for the four general tasks a user needs to perform for a database to function properly: Create, Read, Update, and Delete.

q_itf2_sql_07

Which of the following are the four general tasks a user needs to perform for a database to function properly? Answers:

• Create, Reuse, Unleash, Delete


• Configure, Read, Update, Deny


• Create, Read, Unleash, Deny


• *Create, Read, Update, Delete


Explanation:

For a database to function correctly, users need to be able to do four general tasks: add new information, access existing information, modify information, and delete information. An easy way to remember these is to use the acronym CRUD: Create, Read, Update, and Delete.

None of the other options are correct. q_itf2_sql_08

Which of the following can be used to ask a database questions and receive the data we're looking for? Answers:

• *Queries


• Tables


• Forms


• Reports


Explanation:

Queries are essentially questions that we can ask a database.

Tables are the backbone of any database. Tables store the different information in a database. Forms provide a convenient way for users to enter data into their tables.

Reports provide aesthetic, printable summaries of data. They can be based on tables, queries, or both. q_itf2_sql_backup

A database administrator wants to create a copy of an entire database. Which of the following SQL (Structured Query Language) commands can the administrator use to create the copy?

Answers:

• BACKUP database_name


• CREATE BACKUP database_name


• *BACKUP DATABASE database_name


• CREATE BACKUP DATABASE database_name


Explanation:

Using the BACKUP DATABASE command with the name of the database (database_name) creates a copy of the

database.

The BACKUP database_name command is missing DATABASE, which indicates that you are backing up a database. The CREATE command is not used to create a copy (backup) of a database.

q_itf2_sql_create_01

Which of the following SQL (Structured Query Language) CREATE commands only requires one parameter? Answers:

• CREATE TABLE


• *CREATE DATABASE


• CREATE VIEW


• CREATE INDEX


Explanation:

The CREATE DATABASE command only requires the name of the database.

The CREATE TABLE command requires that you provide the name of the table as well as the fields for the table structure.

The CREATE VIEW command creates a virtual table populated from a SQL statement result-set and requires several parameters, such as the name of the virtual table and the columns to include in the table.

The CREATE INDEX command creates an index within a table that can be used to accelerate the speed of query retrieval time and requires several parameters, such as the name of the index and the name of the table. q_itf2_sql_create_02

As a database administrator, you want to speed up query retrieval time in your relational database. Which of the following SQL commands could you use to accelerate retrieving data with a query?

Answers:

• CREATE VIEW


• ALTER TABLE


• CREATE TABLE


• *CREATE INDEX


Explanation:

The CREATE INDEX command creates an index within a table, which can be used to accelerate the speed of query retrieval time.

The CREATE VIEW command creates a virtual table populated from a SQL statement result-set. It does not speed up query retrieval time.

The ALTER TABLE command can be used to add, change, or remove fields on an existing table. It also lets you define primary and foreign keys. However, it does not speed up query retrieval time.

The CREATE TABLE command simply adds a new table to an existing database. It does not speed up query retrieval time.

q_itf2_sql_csv

A database administrator wants to export the data in a product airline schedule database into a Microsoft Excel spreadsheet.

Which of the following methods would allow the administrator to perform this task? Answers:

• Export the database with the BACKUP DATABASE command; then import the database backup into the spreadsheet.


• Export the database with the BACKUP DATABASE command and use the WHERE command to import the data into a spreadsheet.

• *Export a database dump to a CSV file; then import the CSV file into the spreadsheet.


• Export a database dump to a CSV file; then use the INSERT command to import the CSV file into the spreadsheet.


Explanation:

You can export a database's data into a format that can be read by another program, like a spreadsheet. This is called a database dump, and it typically stores the database schema and data in a CSV file.

While you can use the BACKUP DATABASE command to backup an entire database, the backup is not in a format that can be imported into a spreadsheet.

While you can use the BACKUP DATABASE command to backup an entire database, the WHERE command is used with the SELECT command to help narrow down a query to only the results you want.

While you can use a database dump to create a CSV file that can be imported into a spreadsheet, the INSERT command is used to add new records to an exiting database table, not to import data into another application.

q_itf2_sql_delete

A restaurant chain maintains a Suppliers relational database that lists all suppliers for the restaurant. Recently, the restaurant ended a contract with CafeFresh in favor of another supplier of organic produce.

The database manager wants to use a SQL command to remove CafeFresh from the database. Which of the following commands would remove all CafeFresh records?

Answers:

• *DELETE * FROM Suppliers WHERE supplier_name = 'CafeFresh'


• DELETE FROM TABLE Suppliers WHERE supplier_name = 'CafeFresh'


• DELETE supplier_name = 'CafeFresh' FROM Suppliers


• DELETE Suppliers WHERE supplier_name = 'CafeFresh'


Explanation:

The DELETE * FROM Suppliers WHERE supplier_name = 'CafeFresh' command would remove all records with the supplier name of CafeFresh, which is what the database manager wants to accomplish.

In the DELETE FROM TABLE command, TABLE is not necessary (and incorrect syntax) for identifying the table from which you want to remove one or more rows.

In the DELETE supplier_name command, the supplier_name value should come after naming the database (Suppliers). In the DELETE Suppliers command, the FROM is missing, which is the incorrect syntax for identifying the table. q_itf2_sql_dml

DML (Data Manipulation Language) commands let you manage or query records in a database. Which of the following are DML commands? (Select two.)

Answers:

• *SELECT


• CREATE


• DROP


• *UPDATE


• ALTER


Explanation:

SELECT and UPDATE are DML commands. SELECT lets you query (view) information from a database and UPDATE lets you change the value of one or more table columns (fields).

CREATE is a DDL (Data Definition Language) command that you can use to create a new database or table. DROP is a DDL (Data Definition Language) command that you can use to delete a database or table.

ALTER is a DDL (Data Definition Language) command that you can use with TABLE to add, change, or remove fields in an existing table.

q_itf2_sql_grant

Mark is a database administrator who's responsible for managing the records in a boat inventory relational database for a local chain of boat shops. Recently, the owners have decided to expand to several more stores. Mark has hired David, an assistant administrator, to help out.

In order to get started, he wants to grant permission to the assistant to retrieve and view information in the database. Which of the following SQL commands can Mark use to grant this permission to David?

Answers:

• *GRANT SELECT ON boatinventory TO david


• GRANT ALL ON boatinventory TO david


• GRANT SELECT TO david ON boatinventory


• GRANT UPDATE ON boatinventory TO david


Explanation:

The GRANT SELECT ON boatinventory TO david command gives David the ability to run queries in the database. The SELECT command lets him view specific information he wants to see.

The GRANT ALL command grants the SELECT, INSERT, UPDATE, DELETE and REFERENCES permissions, which not only let David retrieve and view information, but also modify the database (which goes beyond the permissions Mark wants to grant).

The GRANT SELECT TO command places the TO and ON parameters in the wrong order (improper syntax). It should be ON followed by TO.

The GRANT UPDATE command gives David the ability to perform update statements on the table, which means that David can make changes to existing records. This permission goes beyond simply retrieving and viewing information. q_itf2_sql_input

Michael is a web developer who has created a simple website form to survey visitors about their favorite hobbies. What is the MOST likely purpose for which he created the form?

Answers:

• To transfer the survey data from one database to another.


• To create a flat file for each person who fills out the survey.


• To create a database to store the survey data.


• *To directly input the survey data into a database.


Explanation:

The most likely purpose for collecting the survey data is to input it into a database, which will allow him to analyze trends and generate reports.

While Michael could take the data and create a file for each customer survey, it would be much more effective to input it into a database to keep all the data in one location.

The purpose of collecting data using a survey form is to store it in a database, not to create the database itself.

While Michael may transfer the data from one database to another at some point, the most likely purpose for collecting the survey data is to add it to a database.

q_itf2_sql_insert

A database administrator wants to insert a record (row) into a database's Movies table. Which of the following is the SQL command that the administrator can use to insert the record?

Answers:

• INSERT Movies VALUES (166, "The Guardian", 1945, "Hal Manchin") FIELDS (id, title, year, director)


• *INSERT INTO Movies (id, title, year, director) VALUES (166, "The Guardian", 1945, "Hal Manchin")


• ALTER TABLE Movies (id, title, year, director) VALUES (166, "The Guardian", 1945, "Hal Manchin")


• UPDATE TABLE Movies (id, title, year, director) VALUES (166, "The Guardian", 1945, "Hal Manchin")


Explanation:

The INSERT INTO command is the correct syntax for inserting a record (row) into the Movies table.

The INSERT command by itself would not insert a record into the Movies table, as the field names need to come before the values, and the FIELDS command is not used with INSERT.

The ALTER TABLE command lets you add, change, or remove fields on an existing table. It also lets you define primary and foreign keys. It does not let you add a row to a table.

The UPDATE command makes changes to existing records in a table and is usually used with the SET command, not the TABLE command.

q_itf2_sql_permissions

SQL supports commands that give an object's creator the ability to grant rights for specific objects, tables, or columns and provide those rights to other users.

Which of the following database concepts describes this ability to grant rights? Answers:

• *Permissions


• Direct access


• Programmatic access


• Data Definition Language (DDL)


Explanation:

When an object is created, the object's creator becomes the owner of that object. The owner has the ability (through permissions) to grant rights for specific objects, tables, and columns and provide them to other users.

Direct access is a method of accessing a database directly using a database management system. However, this feature does not describe the ability of an object's creator to assign rights to other users.

Programmatic access is a method of accessing a database using custom computer programs. However, this feature is not associated with the ability of an object's creator to assign rights to other users.

Data Definition Language (DDL) includes SQL commands that change the structure, or schema, of a database. It does not allow for assigning rights to users.

q_itf2_sql_permissions_02

A database administrator is using the direct database access method to run several Structured Query Language (SQL) commands on a relational database.

Which of the following SQL commands helps the administrator manage permissions in the database? (Select two.) Answers:

• UPDATE


• SELECT


• *GRANT


• DELETE

• *REVOKE


Explanation:

The GRANT command is used to give a user certain permissions for a specific database object. The REVOKE command removes certain permissions for specific database objects. Both commands would help the administrator manage database permissions.

The UPDATE command makes changes to existing records in a table but does not change database object permissions. The SELECT command lets you view specific information you want from the database but does not change database object permissions.

The DELETE command deletes records from a table but does not change database object permissions. q_itf2_sql_programmatic

Jeremy is building an application that needs access to read, write, update, and delete information in a database. Which of the following databases does Jeremy need?

Answers:

• Direct access


• Query builder


• User interface access


• *Programmatic access


Explanation:

Programmatic access gives developers the ability to write code into their software that reads, writes, updates, and deletes database records.

Direct access gives administrators access to a database through SQL commands. But this does not reflect the type of access that Jeremy is using with his application.

Query builders provide a graphical user interface for people to select which actions they want to perform on a database. But this does not reflect the type of access that Jeremy is using with his application.

User interface access uses forms to gather information from people and then sends the appropriate SQL commands to the database. However, this type of access does not involve providing an application with the necessary code to manage database records.

q_itf2_sql_queries

April is a database manager who wants to insert some new records (rows) into the company's customer contact database. Instead of using a database client to insert the records, she wants to use a command.

Which of the following languages provides a command for inserting records into a database? Answers:

• DDL (Data Definition Language)


• DCL (Data Control Language)


• HTML (HyperText Markup Language)


• *DML (Data Manipulation Language)


Explanation:

Data Manipulation Language (DML) provides commands that let you insert or update records in a database and provides the INSERT command that April needs.

Data Definition Language (DDL) provides commands for changing the structure (schema) of a database.

Data Control Language (DCL) provides commands for backing up, restoring, and managing permissions on a database. HyperText Markup Language (HTML) tells web browsers how to display static text on the screen.

q_itf2_sql_restore

A relational database has become corrupted, and now the database administrator needs to import the most recent database backup to fix the issue.

Which SQL command can the administrator use to perform this task? Answers:

• DROP TABLE


• INSERT INTO


• UPDATE


• *RESTORE


Explanation:

The RESTORE command lets you restore an entire database from a full database backup, which is exactly what the database administrator needs to do.

The DROP TABLE command deletes an entire table, including all the data stored in it. The INSERT INTO command adds new records to an existing table.

The UPDATE command makes changes to existing records in a table. q_itf2_sql_select

Which of the following is a Structured Query Language (SQL) command that lets you view information stored in a database?

Answers:

• GRANT


• CREATE VIEW


• RETRIEVE


• *SELECT


Explanation:

The SELECT command lets you view specific information you want from a database. It's commonly used with the asterisk (*) operator, which tells the computer to include everything.

The GRANT command is used to give a user certain permissions for a specific database object. The CREATE VIEW command creates a virtual table populated from a SQL statement result-set. The RETRIEVE command is not a SQL command.

q_itf2_sql_update

Which of the following SQL commands would change the title of a movie in a Movies relational database from "The Education of Rita" to "Educating Rita"?

Answers:

• *UPDATE Movies SET movie_title = "Educating Rita" WHERE id=124


• UPDATE Movies FROM movie_title = "The Education of Rita" TO "Educating Rita" WHERE id=124


• UPDATE movie_title = "Educating Rita" IN Movies WHERE id=124


• UPDATE Movies OLD movie_title = "The Education of Rita" NEW "Educating Rita" WHERE id=124


Explanation:

The UPDATE Movies SET movie_title = "Educating Rita" WHERE id=124 command would change the movie title

from "The Education of Rita" to "Educating Rita" with the WHERE command identifying the exact record (id=124) where the title is located.

The UPDATE command using FROM and TO is the incorrect syntax for changing the movie title.

The UPDATE command that begins with the new movie_title value and uses an IN command to identify the database is incorrect syntax for changing the movie title.

The UPDATE command using OLD and NEW to change the movie title is incorrect syntax.

7.5 Non-relational Databases Section Introduction

As you study this section, keep the following questions in mind:

• How are non-relational databases similar to relational databases? How are they different?


• How has Big Data changed the world of business?


After finishing this section, you should be able to:

• Describe the basic functions and types of non-relational databases.


• Define the term Big Data and describe its related challenges and opportunities.


Key terms for this section include the following:

Term Definition


Structured Query Language (SQL)

A computer language used by most relational databases for creating queries.


Structured Data

Data that can be divided into discrete categories.


Unstructured Data

Data that doesn't follow a clear pattern.


Semi-Structured Data

Data that has some discrete categories but also other information that doesn't follow a clear pattern.


Big Data

Extremely large sets of data, usually automatically recorded, that can be analyzed to show insights into human behavior trends.


Data Extraction

The process of gathering and organizing big data.


Data Mining

A broad and open-ended analysis of extracted big data.


Big Data Analytics

The process of asking specific questions to help interpret big data.


NoSQL

Nonrelational databases that arise from big data.

7.5.1 Non-relational Databases (Lesson Video) Transcript:

Relational databases are powerful tools for storing data that share the same structure. However, not all data can be stored with rigid fields and records. These kinds of data are usually stored in a nonrelational database. In this video, we'll look at three different kinds of data: structured, non-structured, and semi-structured.

Structured data is data that can be divided into discrete categories. For example, all the books in a library catalog have a title, author, publication year, and so on. This kind of data is easy to store in a structured table, where every single book has a value for every single field and is perfect for a relational database.

Data that doesn't follow a clear pattern is called unstructured data. Imagine an archive of primary sources about the American Civil War that includes journals, newspapers, photographs, telegrams, and poems. A good way to keep track of all these different resources would be a document database. Document databases can store lots of different kinds of files. In our example, a user could enter a search term such as "newspaper" and get a list of the newspaper articles in the database. The file system on your computer is an example of a document database.

Somewhere between structured and unstructured data are semi-structured data. These data don't fit into the rigid rows and columns of a table but have some things in common. For example, think about classifying different kinds of animals. Every animal species has a name, average size, and life expectancy. However, a dog doesn't need a field to store its wingspan, and a butterfly doesn't need a field for its favorite prey. These kinds of data can be stored in a key-value database. A key is a category of information, kind of like a field. Using a key-value database, we could store information about a variety of animals like this. Notice that some keys are common to all the animals, but others are different.

In this video, we looked at three different kinds of data: structured, unstructured, and semi-structured. We also compared three kinds of databases: relational, document, and key value.

7.5.2 Non-relational Database Facts

Relational databases are powerful tools for storing data that share the same structure. However, not all data can be stored using rigid fields and records. These kinds of data are usually stored in a non-relational database. The following table looks at three different kinds of data: structured, non-structured (often called unstructured), and semi-structured.

Table 1: Databases Structures DATA

DESCRIPTION


Structured data

Structured data is data that can be divided into discrete categories. For example, all the books in a library catalog have a title, author, publication year, etc. This kind of data is easy to store in a structured table, where every book has a value for every field. It is perfect for a relational database. Relational databases store data that can be retrieved and manipulated through a predefined schema in a query language.


Non-structured (unstructured) data

Non-structured data is data that doesn't follow a clear pattern. Imagine an archive of primary sources about the American Civil War that includes journals, newspapers, photographs, telegrams, and poems. A good way to keep track of all these different resources would be a document database. Document databases can store lots of different kinds of files. In our example, a user could enter a search term such as newspaper and get a list of the newspaper articles in the database. The file system on your computer is an example of a document database. Extensible Markup Language (XML) is a language like html, except that instead of the tags indicating how to display information, XML creates tags and codes to provide structure for the documents or other objects in a non-structured database. This allows for a variety of data files in the database.


Semi-structured data

Somewhere between structured and non-structured data are semi-structured data. These data don't fit into the rigid rows and columns of a table but have some things in common. For example, think about classifying different kinds of animals. Every animal species has a name, average size, and life expectancy. However, a dog doesn't need a field to store its


wingspan, and a butterfly doesn't need a field for its favorite prey. These kinds of data can be stored in a key/value pair

database. A key is a category of information, kind of like a field. Using a key/value database, we could store information about a variety of objects. Some keys would be common to all the objects, but others would be different. Key/value pair databases do not have a query language. The pairs can't be queried; only the key can be queried. A direct request, such as the commands get, put, or delete, are used to retrieve specific data. The key must be known because there is no search option.


7.5.3 Non-relational Database Challenges

Many traditional databases are what are known as relational databases. Non-relational databases (NoSQL databases) don't follow the traditional relational model. This is done to help overcome some of the challenges faced with traditional database management. There are, however, additional challenges presented by working with a non-relational database. Non-Relational Database Challenges


Non-relational database challenges: investment in data science, data warehousing, validating and securing data, and storage costs. Illustration.

Learning Curve

One of the biggest challenges when dealing with non-relational databases is that there's a steep learning curve associated with them. A talent gap often exists because companies can't find enough knowledgeable recruits that have experience with them. Also, many IT professionals aren't yet familiar with big data technology like specific design principles and report generation.

This problem is further compounded by the fact that there's no standard non-relational database program. Each database interface is separate from all others, meaning that they all vary much more than typical relational databases do.

Overhead Costs

Data mining can be an extremely powerful tool in today's environment, but an effective system for doing so comes at a steep cost. There are many things that need to be invested in to build this system, including personnel recruiting and establishing productive hardware and software environments.

Validating and Securing Data

A relational database makes it easy to clean and validate the data stored there. This becomes more complicated in a non- relational database. Traditional databases use ACID (atomicity, consistency, isolation, and durability) transactions to prevent problems with inconsistent data. Most non-relational database don't perform these transactions, which can lead to these data-consistency issues.

Another challenge is making sure that data is kept secure. Compared to relational databases, non-relational ones have more security issues, such as weak password storage, the inability to use external encryption tools, vulnerability to attacks, and other problems. Being a newer technology, many of these issues will likely be addressed in time. But currently, security is a major problem to consider.

Combining Approaches

What kind of database you use depends largely and on what sort of project you're tackling.

Non-relational databases are better if your focus is on simplicity, scalability, and availably. If you want to focus on accuracy and security, go for a relational database.

Sometimes the solution is to combine the two approaches using data warehousing. Data warehousing is a technology that aggregates data structures from one or more sources. This allows you to use data from different kinds of databases at the same time.

7.5.4 Big Data (Lesson Video) Transcript:

Every day, vast amounts of data are collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. Because these data collections accumulate so quickly, they can't be organized and managed using conventional database tools. The term Big Data refers to two things: first, the actual volume of data collected and stored all over the world, and second, the unconventional tools and processes used to make sense of this data. In this video, we'll explore some of the concepts and concerns associated with Big Data.

The amount of data generated by our use of technology is staggering. Billions of users are involved in transactions and other activities on the Internet. Weather instruments, surveillance cameras, and traffic sensors produce constant streams of raw data.

What can we possibly learn from all this data? From a business perspective, we can use Big Data to effectively target

potential customers in an upcoming advertising campaign. By collecting and analyzing data on business operations, we can make intelligent, data-driven decisions that increase efficiency and optimize product development. We can respond quickly to customer needs and enhance their experience in using our products.

With Big Data, governments can sift through social media profiles, weapons purchases, and other online activities to identify potential terrorists. Medical researchers can use patient information and gene mappings to predict who might need specific treatments. Cities can take advantage of traffic sensor technology to better design roads and keep traffic moving smoothly.

Sorting through and interpreting immense collections of raw data is an expensive and difficult task. So how do big data engineers and analysts do their work?

The first step is to extract the data and organize it in some way. This is a challenge because big data is typically unstructured and distributed over several different locations. And because it's so complex, combining various types of information, big data can't be processed quickly into a relational database. Very often, it includes images, documents, complex numbers, and video. And the data are constantly expanding.

The next step is called data mining, which is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and algorithms to discover trends or patterns in the data. These patterns can be descriptive, helping us understand what's going on in a business operation. Or the patterns might be predictive, putting data scientists in a better position to identify potential threats or to forecast future trends.

This brings us to the last step, which is big data analytics. This is where analysts ask specific questions to help them interpret the data. For example, a business might be interested in making an informed decision regarding product features. With the unstructured and complex nature of big data, we can't use SQL to query an organized collection of relational databases. For this reason, the nonrelational databases that arise from big data are often called NoSQL.

Of course, with all of the exciting benefits of big data, we need to be aware of potential problems. First, data is often obtained without the knowledge or consent of users. This information can be sold to other organizations in a way that violates user privacy. Second, big data analytics can uncover misleading or harmful information on innocent people. For example, we might falsely associate a person with terrorism. This same kind of analysis could also warn health insurance companies when an applicant has a higher risk for genetic disease. These examples illustrate why big data needs to be used with caution and ethical responsibility.

With the explosion of data accompanied by advances in Internet technology, big data has become a major industry. When these vast data collections are analyzed and interpreted for ethical purposes, they can lead to intelligent decision- making, life-saving medical research, effective military surveillance programs, and efficient business operations.

7.5.5 Big Data Facts

Big Data refers to the vast amounts of data collected and stored online based on Internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. The term can also refer to the tools and processes used by data engineers and analysts to make sense of this data. The table below describes key concepts associated with big data.

Table 1: Big Data Concepts CONCEPT DESCRIPTION


Data Extraction

Before analyzing and interpreting big data, it needs to be gathered and organized. This is a challenge because big data is typically unstructured and distributed over several locations. And because it's so complex, combining various types of information, big data can't be processed quickly into a relational database. Very often, it includes images, documents, complex numbers, and video. And the data are constantly expanding.


Data Mining

Data mining is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and algorithms to discover trends or patterns in the data. These patterns can be descriptive, helping us understand what's going on in a business operation. Or the patterns might be predictive, putting data scientists in a better position to identify potential threats or forecast future trends.


Big Data Analytics

Big data analytics is the process of asking specific questions to help interpret data. For example, a business might be

interested in making an informed decision regarding product features. Medical researchers can use patient information and gene mappings to predict who might need specific treatments. Cities can take advantage of traffic sensor technology to better design roads and keep traffic moving smoothly.


Conventional Database Tools

Conventional database tools work well with structured data that are organized into relational databases and data warehouses. These tools are designed for relational database management systems (RDBMS) and use Structured Query Language (SQL) for querying and maintaining the databases. Traditional tools do not work well with big data, which requires query languages and other tools that are more flexible and dynamic.


NoSQL

Because of the unstructured and complex nature of big data, we typically can't use SQL to query an organized collection of relational databases. For this reason, the nonrelational databases that arise from big data are often called NoSQL. NoSQL databases are sometimes called "Not only SQL," since the query languages that support them are often used in conjunction with certain relational database features that do support SQL.


Big Data Ethics

Since big data is often obtained without the knowledge or consent of users, information can be sold to other organizations in a way that violates user privacy. Another potential problem is that big data analytics can uncover misleading or harmful information on innocent people. For example, we might falsely associate a person with terrorism. This same kind of analysis could also warn health insurance companies when an applicant has a higher risk for genetic disease. These examples illustrate why big data needs to be used with caution and ethical responsibility.


7.5.6 Section Quiz (Section Quiz) q_itf2_nrdb_01

Which type of data have elements in common but do not fit into rigid rows and columns in a table? Answers:

• Structured


• Non-structured


• *Semi-structured


• Non-relational


Explanation:

Somewhere between structured and non-structured data are semi-structured data. These data don't fit into the rigid rows and columns of a table but have some similarities.

Structured data is data that can be divided into discrete categories. Non-structured data is data that doesn't follow a clear pattern.

The term non-relational refers to a database that does not follow the relational model that most traditional databases do. q_itf2_nrdb_02

What is the technology that aggregates structured data from one or more sources called? Answers:

• Relational


• Non-relational


• Big Data


• *Data warehousing

Explanation:

Data warehousing is a technology that aggregates structured data from one or more sources. It allows you to use data from different kinds of databases at the same time.

The term relational refers to relationships between items in a database. It is not a technology that aggregates the data from multiple sources.

The term non-relational refers to a database that does not follow the relational model that most traditional databases do. Big Data refers to the vast amounts of data collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors.

q_itf2_nrdb_03

Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database?

Answers:

• *ACID


• CRUD


• SQL


• DBA


Explanation:

ACID (Atomicity, Consistency, Isolation, and Durability) transactions are the traditional way to make sure that data stays consistent across the whole database when it is moved around.

CRUD (Create, Read, Update, and Delete) describes the four main tasks users need to be able to perform for a database to function properly.

SQL stands for Structured Query Language. This is the language that most database programs use. DBA stands for database administrator.

q_itf2_nrdb_04

Which of the following needs to be done before Big Data can be analyzed and interpreted? Answers:

• Data mining


• Data analytics


• *Data extraction


• Securing data


Explanation:

Before analyzing and interpreting Big Data, it needs to be gathered and organized. This process is called data extraction. Data mining is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and algorithms to discover trends or patterns in the data.

Big Data analytics is the process of asking specific questions to help interpret data.

Securing data refers to the specific security challenges that come along with non-relational databases. Many of these databases have securities issues.

q_itf2_nrdb_05

Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?

Answers:

• Data mining

• *Big Data


• Data extraction


• Data analytics


Explanation:

Big Data refers to the vast amounts of data collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. The term can also refer to the tools and processes used by data engineers and analysts to make sense of this data.

Data mining is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and algorithms to discover trends or patterns in the data.

Before analyzing and interpreting Big Data, it needs to be gathered and organized. This process is called data extraction. Big Data analytics is the process of asking specific questions to help interpret data.

q_itf2_nrdb_06

What are non-relational databases that deal with Big Data often referred to as? Answers:

• *NoSQL


• SQL


• RDBMS


• CRUD


Explanation:

Non-relational databases that arise from Big Data are often called NoSQL. NoSQL databases are sometimes called Not only SQL since the query languages that support them are often used in conjunction with certain relational database features that do support SQL.

SQL, or Structured Query Language, is the computer language that makes relational databases work.

RDBMS stands for relational database management system. These are traditional relational database programs.

CRUD (Create, Read, Update, and Delete) describes the four main tasks users need to be able to perform for a database to function properly.

q_itf2_nrdb_07

The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept?

Answers:

• Data analytics


• Data mining


• *Data ethics


• Data extraction


Explanation:

The ethics of Big Data can be a major concern. Since Big Data is often obtained without the knowledge or consent of users, information can be sold to other organizations in a way that violates users' privacy. Another potential problem is that Big Data analytics can uncover misleading or harmful information about innocent people.

Big Data analytics is the process of asking specific questions to help interpret data.

Data mining is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and

algorithms to discover trends or patterns in the data.

Before analyzing and interpreting Big Data, it needs to be gathered and organized. This process is called data extraction. q_itf2_nrdb_08

What is asking specific questions to interpret Big Data called? Answers:

• *Data analytics


• Data mining


• Data ethics


• Data extraction


Explanation:

Big Data analytics is the process of asking specific questions to help interpret data.

Data mining is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and algorithms to discover trends or patterns in the data.

The ethics of Big Data can be a major concern. Since Big Data is often obtained without the knowledge or consent of users, information can be sold to other organizations in a way that violates users' privacy.

Before analyzing and interpreting Big Data, it needs to be gathered and organized. This process is called data extraction. q_itf2_nrdb_09

Which of the following lets you store unstructured data? Answers:

• Relational database


• *Non-relational database


• DBMS


• Flat file database


Explanation:

A non-relational database is specifically designed to store unstructured data.

A relational database is a structured database architecture with tables that organize data into records (rows) and fields (columns). It is not designed to store unstructured data.

A database management system (DBMS) lets you define, manipulate, retrieve, and manage data stored in a database. It is not a database architecture for storing unstructured data.

A flat file database stores data in a single file in plain text format. It is not a database architecture for storing unstructured data.

q_itf2_nrdb_document

A database administrator for a graphics design firm wants to create a database for storing several kinds of files, including photographs, videos, audio files, design documents, and contracts.

Which of the following database types is designed for storing these types of files? Answers:

• *Document database


• Key/pair value database


• Relational database


• SQL database

Explanation:

Document databases are designed to store lots of different kinds of files. This is the type of database that the administrator could easily use for storing photographs, videos, audio files, design documents, and contracts.

A key/pair value database stores semi-structured data, but is not specifically designed to store different types of files.

A relational database is designed to store structured data, but is not specifically designed to store different types of files. An SQL database is a relational database that uses SQL to manage the data in the database, but is not specifically designed to store different types of files.

q_itf2_nrdb_sql

Which of the following is an advantage of using a relational database over a key/value pair database? Answers:

• Relational databases allow for unstructured data.


• Relational databases do not require all fields to be associated with each data object.


• *Relational databases use SQL to retrieve data from the database.


• Relational databases require much less storage space.


Explanation:

A key/value pair database is a non-relational database with semi-structured data. SQL (Structured Query Language) is a computer language that makes relational databases work by performing tasks such as retrieving structured data.

Relational databases are powerful tools for storing structured data in tables.

Key/value pair databases do not require all keys (fields) to be associated with each data object. Saving storage space is not an advantage of using a relational database over a key/value pair database. q_itf_nrdb_facts_01

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?

Answers:

• *Text-based flat file


• Relational database


• Database Management System


• Binary flat file


Explanation:

A flat file database is a simple file, such as a text or binary file, that contains records that use a standard format. The flat file doesn't provide indexing or relationships between records. The best choice would be to use a text flat file that could be opened by other applications.

A relational database and a database management system would be overly complex for this purpose. A binary flat file cannot be opened by other applications in general, such as a text editor. q_itf_nrdb_facts_02

Cindy wants to use a database to store and retrieve information for a research project. She has gathered photos, newspaper articles, interviews, and notes. The information does not appear to have a clear pattern. Which of the following types of data does Cindy want to store?

Answers:

• *Non-structured


• Structured

• Semi-structured


• Relational


Explanation:

Non-structured data is data that doesn't follow a clear pattern. An example would be a document database that provides search capabilities.

Structured data is data that can be organized into discrete categories. Semi-structured data is data that has things in common.

Relational refers to relationships between items in a database. The data described would require a nonrelational database. q_itf_bigdata_facts_01

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as           . Answers:

• *Big Data


• Omni Data


• Metadata


• Business Data


Explanation:

These data are often called "Big Data." Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.6.

7.6 Database Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of database professionals affect my daily life?


• How can I prepare for a career in databases?


This section describes common careers in working with databases. After finishing this section, you should be able to:

• Describe various careers in working with databases, including database administrator, database developer, and data analyst.


• Identify skills and educational requirements for databases careers.


Key terms for this section include the following:

Term Definition


Database Administrator

A person who is responsible for designing, maintaining, backing up, and securing an organization's databases.


Data Scientist

A person who focuses on data analysis, especially as it relates to data mining and big data analytics. These positions

require even more advanced programming and analytical skills.


Database Developer

A person who designs and implements databases, usually by writing SQL code and conducting performance tests to ensure database optimization.


Data Analyst

A person who specializes in gathering and analyzing data to inform business decisions.


7.6.1 Careers with Databases (Lesson Video) Transcript:

Many of the highest paying IT jobs require specific skills related to databases. In this video, we'll talk about a few of the most common database careers, including database administration, database development, data analysis, and data science.

A database administrator (or DBA) is responsible for designing, maintaining, backing up, and securing an organization's databases, which include inventory tracking, customer relationship management, and personnel data. While larger companies usually have a dedicated DBA, systems administrators often assume the role in smaller companies. DBAs are in charge of managing enterprise database platforms such as Microsoft SQL Server and Oracle Database. They often work closely with data analysts to query databases and provide information to help businesses make informed decisions. Database developers also design and implement databases, but their work focuses more on writing SQL code and conducting performance tests to ensure that database systems are optimized for the needs of clients. In addition to understanding SQL, database developers typically have programming expertise in other languages, such as Java and Python.

A data analyst specializes in gathering and analyzing data to inform business decisions. They use their expertise in mathematics and statistics to find relevant trends and patterns in data. Data analysts often work with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes.

Their work often focuses on extracting and mining Big Data, which is the vast amount of data that's collected and stored online.

The work of data scientists also focuses on data analysis, especially as it relates to data mining and Big Data analytics. However, these positions require even more advanced programming and analytical skills. Data scientists work with machine learning algorithms that help them build predictive models and develop strategies for business success. They're proficient in using the latest business intelligence tools, including dashboards, data mining and visualization tools, reporting, and predictive analytics.

In this video, we introduced a few of the most popular careers involving databases. We looked at database administrators, database developers, data analysts, and data scientists. Careers in databases typically require a college degree and specialized training in database management systems.

7.6.2 Database Career Facts

Many of the highest paying IT jobs require specific skills related to databases. The following table gives a description about a few of the most common database careers, including database administration, database development, data analysis, and data science.

Table 1: Database Careers DATABASE CAREER DESCRIPTION


Database Administrator

A database administrator (or DBA) is responsible for designing, maintaining, backing up, and securing an organization's databases, which include inventory tracking, customer relationship management, and personnel data. While larger companies usually have a dedicated DBA, systems administrators often assume the role in smaller companies. DBAs are in charge of managing enterprise database platforms such as Microsoft SQL Server and Oracle Database. They often work closely with data analysts to query databases and provide information to help businesses make informed decisions.

Database Developer

Database developers also design and implement databases, but their work focuses more on writing SQL code and conducting performance tests to ensure that database systems are optimized for the needs of clients. In addition to understanding SQL, database developers typically have programming expertise in other languages, such as Java and Python.


Data Analyst

A data analyst specializes in gathering and analyzing data to inform business decisions. They use their expertise in mathematics and statistics to find relevant trends and patterns in data. Data analysts often work with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes.

Their work often focuses on extracting and mining Big Data, which is the vast amount of data that’s collected and stored online.


Data Scientist

The work of data scientists also focuses on data analysis, especially as it relates to data mining and Big Data analytics. However, these positions require even more advanced programming and analytical skills. Data scientists work with machine learning algorithms


that help them build predictive models and develop strategies for business success. They’re proficient in using the latest business intelligence tools, including dashboards, data mining and visualization tools, reporting, and predictive analytics.


7.6.3 Interview: Data Analyst (Lesson Video) Transcript:

It's just so many people with I'm like "oh I'm in statistics," or "data science," and they're like "oh, I would not have placed you in that." And I'm like "I know, because I'm still cool, right? I'm not super geeky."

The thing I like most about working with data is that it tells a story. You know, you have all this raw information and you don't really know what to do with it. And slowly, as you work with it, and you clean it, you magically get these beautiful tables and beautiful graphs that really help you visualize what's actually going on in a company. So that's what I like about data; is that, you know, it seems really messy and convoluted and doesn't always make sense, and slowly you can start to make it make sense. You can see the story that it tells, and it's pretty cool.

I actually started as a computer science major. I really loved the coding aspect of it, and the whole, you know, not being able to leave my laptop until I fix the bug in my code. I really liked that aspect of it. But once we got into the hardware and software development, I started to kind of lose interest. Going into my third semester, I had an introductory statistics class and I ended up really loving it. With statistics, it was a nice blend of, in my mind, math and computer science. You get to get the geeky stuff while you're still doing your coding and programming.

So to get into data analysis, you can actually come from a myriad of backgrounds. A lot of people that I worked with in my internship--some were econ majors; there was one guy who was in management that was a physics major, of all things. There were others that were in math or statistics and so there's a whole pool of majors that you can choose from that all work with data and they all bring these unique perspectives.

So, during my junior year, I was pretty determined to get a summer internship. So I went to the STEM fair and I found this stand there that didn't have statistics labeled as one of their desired majors, but I decided to go anyway, and I filled out the application. I got an interview and I ended up getting a summer internship.

I know I was always very discouraged when people say "you have to not work a ton, a ton of time" because I felt like I didn't know a lot of people, but going along with that, look at the people you do know, even if it's just, you know, one, two, or three. Talk to your advisors. I got a lot of feedback from them, and I would just say, remaining in close contact, even if it's that you're on the email lists of your department, that's how I found out about the STEM fair; that's how I found out about a position at Purple. Start with who you do know and don't get too overwhelmed with who you don't know.

Learn any language you can in coding. I know languages that aren't required for my current job position, but I definitely think that it still comes in handy because the more languages you learn, the easier it gets to pick up new languages on the

go.

Some skills and attributes that I think are necessary for a field such as this, actually, number one I think is discipline. You know, if there's a problem that you run into, do you walk away from it or do you, you know, go headstrong into the problem until you fix it? You've got to have passion for what you're doing. That doesn't mean you have to want to do it late on a Friday night instead of hanging out with friends, but definitely having that drive and passion for what you're doing is pretty important.

Some advice I would offer for anyone interested in this position is that there is a lot of demand for it, and you don't have to be an expert when you first start out. I still definitely think I'm a beginner, and I have a job position as a data engineer. It can be challenging, but don't get discouraged when you don't master every new skill that you come in contact with. It'll take time, but eventually you'll become pretty confident that you know how to learn versus having this all-powerful knowledge of everything. So just know that you won't be an expert overnight, um, and it's really fun to discover all these new things that you can learn.

7.6.4 Section Quiz (Section Quiz) q_itf_dbcareers_01

Which of the following careers is responsible for backing up and securing an organization's databases? Answers:

• Database developer


• *Database administrator


• Data analyst


• Data scientist


Explanation:

A database administrator is responsible for designing, maintaining, backing up, and securing an organization's databases. Database developers design and implement databases, but their work focuses more on writing SQL code and conducting performance tests to ensure that database systems are optimized for the needs of clients.

A data analyst specializes in gathering and analyzing data to inform business decisions.

Data scientists work with machine learning algorithms that help them build predictive models and develop strategies for business success.

q_itf_dbcareers_02

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?

Answers:

• Database administrator


• Data analyst


• *Database developer


• Data scientist


Explanation:

In addition to understanding SQL, database developers typically have programming expertise in other languages such as Java and Python.

A database administrator is responsible for designing, maintaining, backing up, and securing an organization's databases. A data analyst specializes in gathering and analyzing data to inform business decisions.

Data scientists work with machine learning algorithms that help them build predictive models and develop strategies for business success.

q_itf_dbcareers_03

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns

in data?

Answers:

• Database administrator


• Database developer


• Data scientist


• *Data analyst


Explanation:

A data analyst uses his or her expertise in mathematics and statistics to find relevant trends and patterns in data. Database developers design and implement databases, but their work focuses more on writing SQL code and conducting performance tests to ensure that database systems are optimized for the needs of clients.

A database administrator is responsible for designing, maintaining, backing up, and securing an organization's databases. Data scientists work with machine learning algorithms that help them build predictive models and develop strategies for business success.

q_itf_dbcareers_04

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?

Answers:

• *Data scientist


• Database administrator


• Database developer


• Data analyst


Explanation:

The work of data scientists focuses on data analysis, especially as it relates to data mining and big data analytics. A data analyst specializes in gathering and analyzing data to inform business decisions.

Database developers focus on writing SQL code and conducting performance tests to ensure that database systems are optimized for the needs of clients.

A database administrator is responsible for designing, maintaining, backing up, and securing an organization's databases. q_itf_dbcareers_05

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?

Answers:

• Data scientist


• Database administrator


• *Data analyst


• Database developer


Explanation:

A data analyst often works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes.

Data scientists work with machine learning algorithms that help them build predictive models and develop strategies for business success.

A database administrator is responsible for designing, maintaining, backing up, and securing an organization's databases. Database developers focus on writing SQL code and conducting performance tests to ensure that database systems are optimized for the needs of clients.

8.0 Programming

8.1 Chapter Introduction


A young computer programmer writing many lines of code. Illustration. Programming

This chapter provides a basic overview of computer programming. It introduces programming languages, logic, and development paradigms. Students use JavaScript to define variables, arrays, and functions; execute simple looping and branching logic; and add functionality to a web page. In addition to simple JavaScript programming, students use HTML and CSS to format web page content. The chapter concludes with a brief look at common careers in computer programming.

After finishing this chapter, you should be able to:

• Compare and contrast different types of programming languages and paradigms.


• Analyze and interpret programming logic.


• Use JavaScript to define variables, arrays, and functions.


• Use JavaScript to execute simple branching and looping logic.


• Describe common tools and best practices used in software development.


• Use HTML and CSS to format simple web pages.


• Describe how HTML, CSS, and JavaScript work together to create dynamic web content.


• Identify common careers in computer programming.


8.2 Programming Overview Section Introduction

As you study this section, answer the following questions:

• What is the relationship between computer programming and computer hardware?


• When does it make sense to use a compiled language? When would it be better to use an interpreted language?


• How can pseudocode help me understand how a program works?


In this section, you will learn to:

• Recall significant developments in the history of computer programming.


• Explain what computer programming is and why it is useful.


• Describe the difference between programming and scripting.


• Analyze and interpret pseudocode and programming logic flowcharts.


• Describe the difference between developing computer programs and using software packages.

• Compare and contrast different programming language categories, including interpreted, compiled, and query languages.


Key terms for this section include:


Term Definition


Computer programming

A way of giving computers precise, line-by-line instructions to follow. Computer programming uses programming languages.


Programming language

A formal language comprising a set of instructions that produce various kinds of output. A compiler converts the high- level programming languages into machine language (ones and zeros).


Scripting language

A programming language that supports scripts and uses an interpreter that compiles the code line by line at runtime.


Pseudocode

A way to represent code in a manner that is easier for a wide range of people to understand.


Data type

An attribute attached to a value that tells the compiler or interpreter how the data should be used.


Identifier

A user-defined name of a program element, such as a variable or constant.


Container

A program element, such as an array or vector, that holds a set of values.


Function

A computer routine or snippet of code that can be reused in a computer program.


Object-Oriented Programming (OOP)

A programming paradigm based on the concept of objects that can contain both data and programming code.


Encapsulation

An OOP concept that describes how data and methods are bundled together within one unit or class.


Assembly language

A human-readable, low-level computer language that is a symbolic representation of binary machine language.


Compiled language

A computer programming language, such as C and C++, that uses a software tool called a compiler to translate the code into binary machine language.


Interpreted language

A computer programming language, such as Python, JavaScript, and Ruby, that requires a program called an interpreter to execute the instructions written in the source code each time the application is run.

Runtime engine

A special interpreter that translates bytecode into computer specific machine language. Bytecode is a platform independent, low-level language that is compiled from source code.


Algorithm

Specific, step-by-step procedures that illustrate how a problem will be solved.


Flowchart

A visual representation of the logic in a program.


8.2.1 Introduction to Programming (Lesson Video) Transcript:

Computers are amazing machines. Even simple computers can process data and perform calculations much faster and more accurately than any human. However, as powerful as they are, computers can't do anything until somebody tells them what to do. In fact, the only thing computers can really do is to follow instructions with incredible precision.

Without instructions, computers can't do anything.

Computer programming is giving a computer step-by-step instructions for what you want it to do, in exact detail. Programmers do this by writing code, which is special language that the computer can understand. Just like there are many human languages, there are also many programming languages. Some of the most common are C++, Java, JavaScript, and Python. Here's an example of some code. While this may not make any sense to you, to a computer this is an extremely precise set of instructions to follow.

Let's look at a simple application, then talk about how the computer code behind the scenes makes it work. This application is displaying the number zero. When we push this button that says "count to ten," it increases the number by one. As we keep clicking, the number keeps going up. However, if the number is already at ten, we get a message that says we've already counted to ten, and the number stays the same.

To see how this works, we'll use pseudocode, or precise instructions written in normal English. The first thing to understand is that computers will always execute code line by line, from the top to the bottom. For this example, we'll walk through the program slowly, but a real computer would execute these commands almost instantly. First, the program sets a variable called COUNTER. A variable tells the computer to keep track of a specific piece of information. The program sets the value of COUNTER to zero. Then, the program displays the current value of the COUNTER variable and the button to the screen.

This next block of code tells the computer what to do whenever someone clicks the button. Notice that this next line uses the word "if." Every time the button is pressed, it will check to see if this condition is true. If it is, it'll execute this block of code. Otherwise, it'll skip by this code and move on. The same is true of the if statement down here.

Remember that right now, the value of "COUNTER" is zero. When we click the button, the program checks to see if it should run this block of code. Since COUNTER is less than ten, the program moves on to the next line. First, it changes the value of the COUNTER variable to whatever the old value was plus one. Then, it changes the number display on the screen to the current value of COUNTER. Once it's done with this if block, it moves on to the next one. Since this one only executes if COUNTER is ten or greater, it gets skipped.

These same steps will run every time the button gets pushed. It'll raise the value of COUNTER, then update the display. However, once the value of COUNTER hits ten, this block will no longer execute. That's because it only runs if COUNTER is less than ten. However, the code block down here will run. This block says to alert the user that we've already counted to ten.

We've just gone through an example of a very simple computer program, with only a few lines of code. Most programs that you'll use are made of thousands of lines of code, but the basic principles are the same. The computer reads the code one line at a time, then follows the instructions exactly.

8.2.2 Programming Terminology

Computers can perform calculations and manage data, but they can't do anything without instructions. Computer programming is a way of giving computers precise instructions to follow.

The following table describes important terms related to computer programming. Table 1: Programming Concepts

TERM DESCRIPTION


Programming language

Computers can't understand and accept instructions from regular human speech. Instead, they rely on programming languages. Programming languages allow programmers to give the computer precise, line-by-line instructions about what it should do. There are dozens of programming languages, each with its own rules and syntax. Some of the most common languages are C, C++, C#, Python, Java, and JavaScript.


Data types

A data type is an attribute attached to a value that tells the compiler or interpreter how the data should be used. Each programming language has a slightly different set of data types. The following are a few common data types:

• Integer is used for whole numbers. These include both positive and negative numbers, as well as zero.


• Float is used for numbers that have decimal places. It's called float because the computer stores two values behind the scenes: the digits in the number and the location of the decimal point that can float around to any location within the number.


• Char can store a single text character that uses 1 byte of storage.


• String is used to store more than one character, such as a word or sentence. Key points are: o Strings are used in many programming languages.


o Specific characters are used to indicate an instruction to the program, such as double quotation marks, ampersand, and backslash.


o When special characters are needed to communicate their English language meaning within the string they are escaped to let the program understand the way to use the character. For example, in Javascript you put a \ before the character to escape it.


o The boolean data type consists of two values: True and False. This is especially useful when dealing with things that can be in one of two states, such as a light that can be turned on or off, a door that can be open or shut, or a user that's logged in or logged out.


Identifiers

In programming, identifiers are used to define names for specific values. The two most common identifiers are:

• Variables


• Constants


A variable holds a value such as numbers, words, and phrases. Variables can change the values they're holding. Take online banking as an example.

• To get a checking account balance, the program sends a query to the bank's database, which returns the value of the balance.

• To keep track of this value, the program uses a variable called checkingBalance.


• If the balance changes because of a deposit or withdrawal, the program keeps track of the changes by adjusting the value of the checkingBalance variable.


• Whenever the program needs the checking balance, it calls for the variable.


8.2.3 Programming Languages (Lesson Video) Transcript:

At their most basic level, computers are machines that respond to physical signals, such as positive and negative electric charges, which we represent as ones and zeros. Processors recognize specific configurations of ones and zeros as commands. This is called machine language. Machine language is extremely difficult for humans to understand. Imagine being a programmer and trying to work with a file that looks like this. Even if you knew how to interpret the binary, it would take you hours just to figure out what the code's supposed to do. Fortunately, modern developers don't have to work directly with machine language. Instead, they use programming languages. These languages make computer instructions much easier for humans to read and write.

The most basic human-readable computer language is called assembly language. Unlike the other languages we'll look at in this video, assembly language is very closely related to the binary machine language. Let's look at an example. This is a machine language command that tells the processor to store the number 42 to a temporary register. Here's the same command written in assembly language.

Even though assembly language is much easier to understand than machine language, it's cumbersome to write and use, and you'll usually only hear about it in discussions of computer history.

Next, let's talk about compiled programming languages, which include C and C++. Source code written in these languages can't be run immediately after it's written. Instead, a software tool called a compiler translates the code into machine language, then saves the translation as a file called a binary executable, or .exe file. This method has several strengths. Because the executable file is already written in machine language, it can go directly to the processor without any additional steps, resulting in fast execution. Another advantage is that these programs have full access to everything on the platform, including cameras, motion sensors, USB-connected devices, and GPS. Because of these advantages, resource-intensive programs such as top-end video games are generally written in compiled languages.

Unfortunately, compiled programs have a serious weakness – different kinds of computers speak different machine languages. An executable that works just fine on an XBOX won't work on a PlayStation or Nintendo console. To make a compiled program work on multiple platforms, the developer needs to rewrite and recompile for each one, which is slow and prone to errors.

Another solution to making a program work on multiple platforms is to use an interpreted language, such as Python, JavaScript, or Ruby. Programs written in these languages don't translate source code into binary ahead of time. Instead, a program called an interpreter executes the instructions written in the source code whenever the application is run.

Interpreted programs have the huge advantage of being platform independent. However, this comes at a major cost to performance; they are slower than compiled programs and have limited access to the system's resources. Most applications you access through your web browser, including the labs in this course, are written in interpreted languages. A third category of languages, which includes C# and Java, combines the ideas of compiling and interpreting to get many of the advantages of both. You can think of it kind of like building a model from a kit. Most of the hard work of molding plastic and cutting metal is done in the factory. Once you bring the kit home, all you have to do is put the pieces together and paint the model to your liking.

Programs written in these languages follow a two-step process. First, they're compiled into a low-level language called bytecode. Then, when the code is run, a special interpreter called a runtime engine translates the bytecode into that computer's specific machine language. Like interpreted languages, bytecode is platform independent – any computer can run it just fine. The advantage is that bytecode is much easier for the computer to run than an interpreted language, which dramatically improves performance. However, it still runs slower than a fully-compiled executable.

In this video, we talked about computer programming languages. We started by discussing machine language, which is a series of basic commands written in binary. We talked about assembly language, which is a way to make machine

language easier for humans to understand. We talked about the two main categories of programming languages – compiled languages and interpreted languages. Finally, we talked about a subcategory of compiled languages that combines ideas from both compiling and interpreting.

8.2.4 Programming Language Facts

Computer software is written to tell a computer what to do. These instructions can be written in a variety of programming languages. A program gives step-by-step instructions to the computer. The instructions must be very specific as the computer can only do what it is told.

Any part of a programming sequence that is open to variation (like input from a user), must have instructions for possible variations. A flow chart can help with visualizing how each variation and step can flow together. The following table describes the most common computer language categories.

Table 1: Computer Languages LANGUAGE DESCRIPTION


Machine language

At their most basic level, computers are machines that respond to physical signals, such as positive and negative electric charges that represent ones and zeros. Processors recognize specific configurations of ones and zeros as commands.

This is called machine language. Machine language is extremely difficult for humans to understand. Imagine being a programmer and trying to work with a file with millions of ones and zeros. Even if you knew how to interpret the binary information, it would take you hours just to figure out what the code was supposed to do. Fortunately, modern developers don't have to work directly with machine language. Instead, they use programming languages. These languages make computer instructions much easier for humans to read and write.


Assembly language

The most basic human-readable computer language is called assembly language. Unlike the other languages, assembly language is closely related to the binary machine language. For example, 1010010101000000000 is a machine language command that tells the


processor to store the number 42 to a temporary register. The same command written in assembly language is add ax, 42. Even though assembly language is much easier to understand than machine language, it's cumbersome to write and use, and you'll usually hear about it only in discussions of computer history. However, it is important to note that code written in assembly language is more efficient, meaning it will give you better performance when the code is run. Part of the reason it is more efficient is that assembly language allows direct access to hardware; it is very specific to the processor used as well as other hardware.


Compiled languages

Compiled programming languages, which include C and C++, use a software tool called a compiler to translate the code into machine language. The source code written in these languages can't be run immediately after it's written. The compiler saves the translation as a file called a binary executable (.exe file). This method has several strengths. Because the executable file is written in machine language, it can go directly to the processor without any additional steps, resulting in fast execution. Another advantage is that these programs have full access to everything on the platform, including cameras, motion sensors, USB-connected devices, and GPS. Because of these advantages, resource-intensive programs such as top-end video games are generally written in compiled languages. Unfortunately, different kinds of computers speak different machine languages. An executable that works on an XBOX won't work on a PlayStation or Nintendo console. To make a compiled program work on multiple platforms, the developer must rewrite and recompile for each platform (a process called porting ), which is slow and prone to errors.

Additional examples of compiled languages include C#, COBOL, and PASCAL.


Interpreted languages

Interpreted languages are another solution to making a program work on multiple platforms. These languages include such programs as Python, JavaScript, Ruby, and Perl. Programs written in these languages don't translate source code

into binary ahead of time. Instead, a program called an interpreter executes the instructions written in the source code whenever the application is run. Interpreted programs have the advantage of being platform independent. However, they are slower than compiled programs and have limited access to the system's resources. Most applications you access through your web browser, including the labs in this course, are written in interpreted languages. Interpreted languages are also known as scripting languages. In addition to the ones previously listed, many operating systems also include a scripting language to support their own particular operating system, such as Windows PowerShell and Command Prompt, as well as Linux Bash. For example, Windows supports batch files. A batch file contains a collection of commands that are run in sequence for you. Windows PowerShell contains both a command-line shell and the associated scripting language, Windows PowerShell Integrated Scripting Environment (ISE). PowerShell is often used to perform administrative and management tasks. In some cases, these types of tasks can be performed only using a PowerShell script. Another Windows scripting language is Microsoft Visual Basic Scripting Edition (VBScript).


VBScript is an active scripting language developed by Microsoft that is modeled on Visual Basic. It allows Microsoft Windows system administrators to generate powerful tools for managing computers with error handling, subroutines, and other advanced programming constructs. It can give the user complete control over many aspects of their computing environment.


Runtime engines

A subcategory of compiled languages combines the ideas of compiling and interpreting to get many of the advantages of both. Examples include C# and Java. Programs written in these languages follow a two-step process. First, they're compiled into a low-level language called bytecode. When the code is run, a special interpreter called a runtime engine translates the bytecode into that computer's specific machine language. Similar to interpreted languages, bytecode is platform independent. Any computer can run it. The advantage is that bytecode is much easier for the computer to run than an interpreted language. This dramatically improves performance. However, it still runs slower than a fully- compiled executable.


Other language categories

HyperText Markup Language (HTML) and other markup languages, such as eXtensible Markup Language (XML) are generally not considered to be programming languages. The main purpose of HTML is to tell web browsers how to display static text on the screen. XML uses nested tags to create structure and give meaning to the content within the tags. Another language category includes query languages such as Structured Query Language (SQL) that are used to retrieve information from databases.


8.2.5 History of Programming Languages

The history of computer programming goes back further than you probably realize. After Charles Babbage designed his Analytical Engine in the mid-1800s, he met Ada Lovelace, who is considered by historians to be the first computer programmer. She wrote an algorithm to calculate Bernoulli numbers using the Analytical Engine.

Ada Lovelace, circa 1840


Ada Lovelace, one of the world's first computer programmers.

Since that time, computer programming has evolved to match the capabilities of the complex supercomputers of the modern era that can perform mind-boggling numbers of calculations in a single second. But the basic purpose of programming remains the same—to give specific instructions to a computer.

The First Major Languages

In 1949, a low-level language called Assembly Language was created to run the Electronic Delay Storage Automatic Calculators (EDSAC). The first compiled programming language appeared in 1952 and was called Autocode. The code could be translated into machine code that a computer could use by running it through a program known as a compiler. Most of the first major languages used to program computers are no longer in use today, but they provided the building blocks on which more modern languages were built.

The Second Major Languages

Logos for C++, Java, C#, JavaScript, Ruby, and Python


Computer programming language logos: C++, Java, C#, JavaScript, Ruby, and Python.

The second major leap occurred soon after and involved languages that are still in use by programmers today, some of which were developed as far back as the 1950s. These include languages such as FORTRAN (Formula Translation), LISP (LISt Processor), and COBOL (Common Business Oriented Language).

FORTRAN

In 1957, American programmer John Backus created FORTRAN to take care of complex math problems. It's one of the oldest languages still in use today.

BASIC

In 1964, the programming language BASIC was modified by Paul Allen and Bill Gates and became the first product made by their company, Microsoft.

Pascal

In the 1970s, a high-level language was developed for teaching structured programming and was called Pascal after the French mathematician and physicist Blaise Pascal.

C

In 1972, a general-purpose, low-level language called C was created. C was based on an earlier language called B and came to be used extensively in Unix operating systems. Almost all programming languages in meaningful use today are based on C, such as C#, Java, JavaScript, Perl, PHP, and Python, among many others. It was the choice of the earliest programmers who worked on Apple Computers as well.

C++

In 1983, an extension of C was created called C++. This was an intermediate-level, object-oriented language that contained more features than C, like templates and virtual functions.

Perl

In 1987, American programmer Larry Wall created Perl. Perl is a high-level, general-purpose language that was made to run on Unix systems. It's still in use today, though at this time Perl is considered to be slowly fading into the status of a legacy language. In the late 1990s, however, Perl was said to be the glue that holds the internet together.

Python

In 1991, a Dutch programmer named Guido van Rossum created a language that he called Python, which was named after the Monty Python comedy troupe. It was a general-purpose language and was made to support a variety of programming styles while still being easy to use. Python is still very much in use today. Many large companies, such as Google and Yahoo, use Python extensively, and for the foreseeable future it will be the premier language for developing Artificial Intelligence (AI).

Ruby

In 1993, Japanese programmer Yukihiro Matsumoto created Ruby, which is a general-purpose, high-level language that was meant to teach others how to code. It was influenced by other languages such as Perl. It's still used by major websites such as Twitter and Groupon.

Java

In 1995, Canadian programmer James Gosling created Java while working for Sun Microsystems. Java is a general- purpose, high-level language that was originally developed for an interactive TV project and was designed to have cross- platform functionality. Java is among the most widely used programming languages in the world today and used extensively by Android apps.

PHP

In 1995, Danish-Canadian Rasmus Lerdorf create PHP, which stood for "Personal Home Page." It was an open-source, general purpose language for creating dynamic web pages mainly on the server side. PHP is used in all corners of the internet, including by Facebook, Wikipedia, and WordPress. By some estimates, almost 80% of all websites still use PHP in some capacity.

JavaScript

In 1995, American programmer Brendan Eich created JavaScript, which is a high-level language that was made to extend the interactivity of websites. It's almost exclusively the language of use on the front end (client side) of websites. In other words, because of JavaScript we have the ability to easily click a button, fill out a form, check out a link, and much more.

8.2.6 Working with Pseudocode

Pseudocode is a way to represent code in a way that's easy for a wide range of people to understand. It isn't valid code;

it's more like a simplified explanation of what's going on without too much jargon.

With pseudocode, you can walk someone through a process or walk them through the entire program. You show them where it starts and ends and what you expect the results to be from all the inputs and outputs. You would cover any branching events in the code that could possibly be relevant.

Algorithm A


Exam with graduation cap. Illustration.

Consider the following example of pseudocode. What do you think this program is meant to do? If student's grade is greater than or equal to 65


8.2.7 Section Quiz (Section Quiz) q_itf_programming_constant

Kris is creating the pseudocode for a program that needs a specific value that doesn't change. Which type of identifier is defined in the following pseudocode:

declare pi as a float equal to 3.14 Answers:

• *Constant


• Variable


• Container


• Array


Explanation:

q_itf_programming_container

Lydia, a programmer, is using a two-dimensional array to store a user's status for their chat program. As a container, an array is a special kind of variable that can store many values. Lydia created the following:

declare user(40,2) as a string

Which of the following is true about containers? Answers:

• *A container is an identifier that is used to reference the user array.


• A container is only used to declare arrays.


• A container cannot be used for string vectors.


• A container is not relevant to this array example.


Explanation:

A container is a unique identifier that is used to reference the user array in this example. Two of the most common containers are arrays and vectors.

A vector can be used to store strings.

A container is relevant to the example in this question because as a container, the array is a special kind of variable that can store many values.

q_itf_programming_float

While both the integer data type and float data type can be used for whole numbers, what advantage does the float data type have over integers?

Answers:

• Floats can store a word or sentence.

• *Floats can include decimal places.


• Floats represent two values - True or False.


• Floats use less storage than an integer.


Explanation:

The float data type is used for numbers that have decimal places.

The string data type is used to store more than one character, such as a word or sentence. The Boolean data type consists of exactly two values - True or False.

While the integer data type uses 1 to 8 bytes of computer storage, the float data type uses 4 to 8 bytes of computer storage.

q_itf_programming_string

Mark wants to include a string in his computer program that lets users know they have selected the correct option. He wants to include the option in double quotes. However, the entire string also needs to be delimited by double quotes. Which of the following is the string Mark should use to include the option in double quotes?

Answers:

• \"Congratulations! "Launch Audit" is the correct option.\"


• "\Congratulations! "Launch Audit" is the correct option.\"


• *"Congratulations! \"Launch Audit\" is the correct option."


• "\Congratulations! "Launch Audit" is the correct option.\"


Explanation:

Strings in a program are commonly delimited by single or double quotes (such as "Hello World!"). If you want to use a delimiter in a string, you need to use the escape character (\) in front of it. In this example, the string "Congratulations!

\"Launch Audit\" is the correct option." contains the escape character before the double quotes surrounding "Launch Audit". By adding the escape character (\) in front of each double quote surrounding "Launch Audit", you are identifying the double quotes as characters in the string instead of string delimiters.

\"Congratulations! "Launch Audit" is the correct option.\" uses the escape character before the phrase delimiters instead of before the double quotes surrounding "Launch Audit".

"Congratulations! "\Launch Audit\" is the correct option." places the escape character after (instead of before) the first double quote in "Launch Audit".

"\Congratulations! "Launch Audit" is the correct option.\" uses the escape character with the phrase delimiters instead of with the double quotes surrounding "Launch Audit".

q_itf_programming_terms_01

The idea of programming by modeling real-world things into computer code is called         . Answers:

• *Object-oriented programming


• Inheritance


• Encapsulation


• Polymorphism


Explanation:

Object-oriented programming creates programs by modeling real-world things into code. Encapsulation, polymorphism, and inheritance are all principles of Object-oriented programming.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_programming_terms_02

       is a principle that limits access to certain parts of a program to public methods. Answers:

• *Encapsulation


• Polymorphism


• Inheritance


• Abstraction


Explanation:

In object-oriented programming, encapsulation is the principle that limits access to certain parts of the code to public methods. By encapsulating data, the programmer ensures that data will always be handled in the appropriate way.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_programming_terms_03

A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value?

Answers:

• *Char


• String


• Single


• Boolean


Explanation:

Char is used to hold a single character.

String is used to store multiple characters. A string can contain a single character; however, char is the best choice when the value the developer is storing will always be a single character.

Single is a numeric data type used to contain floating-point values.

Boolean is used to store a true or false value and cannot be used to store a single character. q_itf_programming_terms_04

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

Answers:

• *Boolean


• Integer


• Float


• String


Explanation:

Boolean is used to store a true or false value and cannot be used to store characters or numbers.

Integers are used to store whole numbers. Floats are used to store decimal numbers. String is used to store multiple characters. q_itf_programming_terms_05

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose?

Answers:

• *Integer


• String


• Float


• Boolean


Explanation:

The integer data type is used for whole numbers. These include both positive and negative numbers, as well as zero.

A float is used for numbers that contain decimal precision and would not be the best choice for whole numbers because whole numbers do not require decimal precision.

String is used to store multiple characters. Boolean is used to store a true or false value. q_itf_programming_terms_06

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?

Answers:

• *Float


• Integer


• Boolean


• String


Explanation:

The float data type is used for numbers that have decimal places. It's called "float" because the computer stores two values behind the scenes: the digits in the number and the location of the decimal point, which can "float" around to any location within the number.

The integer data type is used for whole numbers.

The Boolean data type consists of exactly two values: True and False.

The string data type is used to store more than one character, such as a word or sentence. q_itf_programming_terms_07

A developer is creating a container that needs the ability to resize itself dynamically when an element is added or removed and can hold many values. Which of the following would BEST provide this functionality?

Answers:

• *Vector


• Array


• Variable


• Constant

A vector is a dynamic array that has the ability to automatically manage the storage space used by the container as elements are added or removed.

In most programming languages, a standard array uses fixed size storage and is not dynamic. A variable is an identifier used to store a single value.

A constant is an identifier used to store a single value that does not change. q_itf_programming_terms_08

A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value?

Answers:

• *Variable


• Constant


• Object


• Array


Explanation:

A variable can be compared to a case that holds onto numbers, words, phrases, and other values. As the name suggests, they can also change the values they're holding.

A constant is an identifier that keeps track of values, but unlike a variable, constants can never change. Objects are the specific models built from the class templates in object-oriented programming.

Arrays are used to hold multiple values, which would not apply in this case where only the last order number is stored. q_itf_programming_terms_09

Which of the following is a type of variable that can hold many values at the same time? Answers:

• *Array


• Variable


• Constant


• Value


Explanation:

An array is a special kind of variable that can hold onto many values at the same time. A variable is used to store a single value.

A constant is used to store a single value that doesn't change. A value is the data that is stored in a variable. q_itf_programming_terms_10

In programming, which of the following is the BEST use of a function? Answers:

• *Provide reusable code snippets


• Bundle data and methods


• Contain methods


• Prevent unauthorized access to data

Functions are snippets of code that you can write once and reuse whenever you need them. Encapsulation is used in object-oriented programming to bundle data and methods.

Classes are used in object-oriented programming and contain methods. Encapsulation also helps prevent unauthorized access to data and methods. q_itf_programming_terms_11

Which of the following programming models are built from class templates that have properties, attributes, and methods?

Answers:

• *Objects


• Encapsulation


• Functions


• Vector


Explanation:

Objects are the specific models built from the class templates. A class serves as a prototype, or template, for individual objects in the class. Classes contain properties which are the attributes or characteristics that objects can hold. Classes also contain methods which are the behaviors or operations that the objects can perform.

Encapsulation is a concept in object-oriented programming that describes how data and methods are bundled together within one unit or class.

Functions are snippets of code that you can write once and reuse whenever you need them.

A vector is a dynamic array that has the ability to automatically manage the storage space used by the container as elements are added or removed.

q_itf_programming_terms_12

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use?

Answers:

• *String


• Integer


• Float


• Boolean


Explanation:

The String data type is used to store more than one character, such as a word, a sentence, or a combination of letters and numbers. As such, it would be appropriate for postal codes.

Since the Boolean data type consists of exactly two values, true and false, it would not be suitable for postal codes.

The Integer data type is used for whole numbers, especially when you might want to perform arithmetic on the numbers. While some postal codes are defined as numbers, others include both letters and numbers. And some include four numbers after a dash. For these reasons, postal codes should be stored as strings rather than integers.

The Float data type is used for numbers that have decimal places. It would not be suitable for postal codes. q_itf_programming_terms_13

Which of the following is used to model real-world objects into computer code? Answers:

• *Object-oriented programming

• Pseudocode


• Flow charting


• Algorithms


Explanation:

Object-oriented programming is a programming paradigm based on the concept of objects which can contain both data and programming code. The objects model real-world objects.

Pseudocode provides a human-readable description of computer programming logic that can be used by a programmer to convert into any computer programming language.

Flow charting uses a visual depiction of shapes that represent a process or workflow. During the design phase of creating a program, flow charting is helpful to document the interactions the application will provide.

Algorithms provide specific, step-by-step procedures that illustrate how a problem will be solved. q_itf_programming_terms_14

Which of the following is a programming identifier that would be used to define values that change? Answers:

• *Variables


• Constants


• Arrays


• Vectors


Explanation:

A variable is an identifier used to store a single value that can change.

A constant is an identifier used to store a single value that does not change. An array is a data structure used to store multiple values of the same type.

A vector is a dynamic array that has the ability to automatically manage the storage space used by the container as elements are added or removed.

q_itf_programming_terms_15

Which of the following is a programming identifier that would be used to define values that don't change? Answers:

• *Constants


• Variables


• Arrays


• Vectors


Explanation:

A constant is an identifier used to store a single value that does not change. A variable is an identifier used to store a single value that can change.

An array is a data structure used to store multiple values of the same type.

A vector is a dynamic array that has the ability to automatically manage the storage space used by the container as elements are added or removed.

q_itf_programming_terms_16

In object-oriented programming, which of the following concepts is used to describe properties? Answers:

• *Attributes


• Polymorphism


• Methods


• Encapsulation


Explanation:

Properties are the attributes or characteristics that objects can hold.

Polymorphism is used to call code that doesn't care if it is a parent class or a descendant class. For example, a class called Shape can have objects Circle or Square. A function can be called to display the different shapes.

Methods are lines of code that perform specific operations.

Encapsulation is an OOP concept that describes how data and methods are bundled together within one unit or class. q_itf_programming_terms_17

Julien, a programmer, was fixing a bug in the programming code written by another developer. He discovered that the code with the bug was repeated several times. Instead of fixing the bug in multiple places, which of the following programming features should he use so the code is only located in one place?

Answers:

• *Functions


• Container


• Loops


• Variables


Explanation:

Functions are computer routines, or snippets of code, that can be reused in a computer program. A Container is a program element, such as an array or vector, that holds a set of values.

Loops in programming are typically "for" or "while" loops that repeatedly run until a specific condition is met. Loops are frequently used in a function that can be called.

Variables in programming are used to store values that can be referenced. The value in a variable can be changed. q_itf_languagesfacts_01

Computer programming is           . Answers:

• *Giving a computer precise instructions for what it should do.


• An application that can run on a computer.


• Using advanced computer applications like Excel or Access.


• Operating a machine with computerized components, such as a smartphone.


Explanation:

Computer programmers use code to create precise instructions for computers to follow. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_languagesfacts_02

Which of the following is technically NOT a programming language?

• *HTML


• JavaScript


• Java


• C++


Explanation:

JavaScript, Java, and C++ are all programming languages, meaning they give the computer precise instructions for how to behave.

HTML is a markup language. Instead of giving the computer instructions, it uses tags to mark up text, which can then be interpreted by computer programs, such as a web browser.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_languagesfacts_03

Match each language to its general purpose in a website. Answers:

• HTML


• CSS


• JavaScript


Explanation:

HTML (Hypertext Markup Language) creates website structure and content.

CSS (Cascading Style Sheets) adds colors, fonts, and other design elements to a website. JavaScript makes website elements interactive.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_languagesfacts_04

A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability?

Answers:

• *C++


• PowerShell


• Perl


• Ruby


Explanation:

C++ is a compiled programming language that can be used to redistribute an executable file. PowerShell, Perl, and Ruby are all interpreted languages.

Additionally, there are some languages like Java and C# that are compiled into bytecode, which use both compilers and interpreters and are typically considered compiled languages.

q_itf_languagesfacts_05

A business user wants to retrieve data from a relational database. Which of the following would they use to get the data they need?

• *Query language


• Interpreted language


• Markup language


• Compiled language


Explanation:

A query language is used to interact with a database.

Interpreted, markup, and compiled languages do not typically accomplish this task. q_itf_languagesfacts_06

Which of the following describes this code snippet? Answers:

• *Pseudocode


• Markup language


• Query language


• C# code


Explanation:

Pseudocode provides a human readable description of computer programming logic that can be used by a programmer to convert into any computer programming language.

Markup language is typically used to create a website. For example, a developer would use HTML to create a website. Query language is used to interact with a database.

C# code would be actual computer programming language code. q_itf_languagesfacts_08

Alan, a programmer, needs to create an interactive web page. Which of the following programming languages types would he MOST likely use?

Answers:

• *Interpreted


• Compiled


• Query


• Assembly


Explanation:

Interpreted languages, including Python, JavaScript, and Ruby, require a program called an interpreter to execute the instructions written in the source code each time the application is run.

Compiled languages, including C and C++, use a software tool called a compiler to translate the code into binary machine language.

Query languages such as SQL provide interaction with a database.

Assembly is a human-readable, low-level computer language that is a symbolic representation of binary machine language.

q_itf_languagesfacts_09

Which programming language type is the most basic human-readable and closest to actual machine language?

• *Assembly


• Interpreted


• Compiled


• Query


Explanation:

Assembly is a human-readable, low-level computer language that is a symbolic representation of binary machine language.

Interpreted languages, including Python, JavaScript, and Ruby, require a program called an interpreter to execute the instructions written in the source code each time the application is run.

Compiled languages, including C and C++, use a software tool called a compiler to translate the code into binary machine language.

Query languages such as SQL provide interaction with a database. q_itf_languagesfacts_assembly_01

Hans is programming a device driver that will interact directly with hardware. The language he's using is considered the most difficult human-readable language. Which of the following languages is he utilizing?

Answers:

• *Assembly


• Compiled


• Markup


• Interpreted


Explanation:

Assembly language is considered the most difficult human-readable language. It is used for interacting directly with hardware, such as programming a device driver. It is also used to access specialized central processing unit instructions and other applications where performance is critical.

Complied, markup, and interpreted languages are considered high-level languages and are much easier to read and follow than assembly language.

q_itf_languagesfacts_assembly_02

Lynda, a programmer, is developing a Linux device driver in assembly language. Many device drivers are written in the C language. Which of the following is the BEST reason for using assembly language instead of C?

Answers:

• *Code written in assembly is more efficient and allows direct access to hardware.


• Assembly code is more detailed and doesn't use libraries.


• Code written in assembly is easier to read than compiled C code.


• Assembly code is more portable than C.


Explanation:

Assembly language is a human-readable, low-level computer language that is a symbolic representation of binary machine language. Code written in assembly is more efficient and allows direct access to hardware.

Assembly is considered more difficult to read and follow than C. Also, not having libraries of code similar to C is a

disadvantage.

Code written in C is more readable than assembly. Complied code in C would not be human readable. Assembly is very processor- and hardware-specific and, as such, is less portable than C. q_itf_languagesfacts_compiled_01

Lisa is a software developer and needs to create a complied executable program for one of her clients. Which of the following is a compiled programming language she could use? (Select two.)

Answers:

• *Java


• *C#


• JavaScript


• PHP


• Perl


• SQL


Explanation:

Java and C# are both compiled languages. JavaScript, PHP, and Perl are interpreted languages.

SQL is a query language used to interact with databases. q_itf_languagesfacts_compiled_02

Tyler, a software developer, is creating a program written in Java to calculate loan payments. Which language type BEST describes Java?

Answers:

• *Compiled


• Interpreted


• Scripting


• Markup


Explanation:

Java is a compiled language. It is a class-based, object-oriented programming language that's known for its capability to write code once and run on multiple platforms.

Java is not considered an interpreted, scripting, or markup language. q_itf_languagesfacts_compiled_03

Which of the following programming languages is a compiled language? Answers:

• *C


• JavaScript


• SQL


• Ruby


Explanation:

C is a compiled programming language. JavaScript and Ruby are interpreted languages. SQL is a query language used to access databases. q_itf_languagesfacts_flowchart

A programmer wants to create a visual representation of all the branching and sequencing for a program. Which of the following should the programmer use?

Answers:

• *Flow chart


• Function


• Pseudocode


• Algorithm


Explanation:

A flow chart (also written flowchart) is a visual representation of the branching and sequencing that occurs in a program. It provides a visual tool to check the programming logic and ensure all options are taken into consideration.

A function is computer routine or snippet of code that can be reused in a computer program. Pseudocode provides non-visual steps that can be used to translate a program into different languages. An algorithm is a systematic and logical approach to solving a problem. q_itf_languagesfacts_interpreted_01

David is creating a cross-platform program using Python. Which of the following language types is Python? Answers:

• *Interpreted


• Compiled


• Query


• Markup


Explanation:

Python is an interpreted language. Interpreted languages are used to create programs that work on multiple platforms. Complied languages translate code into machine language. The code can be compiled for multiple platforms. However, Python is not a compiled language.

Query languages interact with databases. An example is SQL.

Markup languages are used to tell web browsers how to display static content on a screen, such as HTML. q_itf_languagesfacts_interpreted_02

Phillip, a programmer, is trying to decide whether to use a compiled language or an interpreted language. The program needs to work on multiple platforms. Which of the following would be the BEST reason for choosing an interpreted language?

Answers:

• *A compiled language requires rewriting and recompiling for each platform.


• A compiled language executes slower than interpreted languages.


• A interpreted language does not require code to be compiled into bytecode.


• A interpreted language can be provided to customers on different platforms in the form of an executable file.

Explanation:

An interpreted languages does not have to be rewritten and recompiled for each platform. With the requirement for the program to run on multiple platforms, this is the best choice.

A compiled program executes faster than an interpreted program.

An interpreted program is compiled into bytecode when executed. The interpreter, called a runtime engine, translates the bytecode into that platform's specific machine code.

A compiled language can be delivered to a customer in the form of an executable file, whereas an interpreted language cannot.

q_itf_languagesfacts_interpreted_03

Which of the following programming languages are interpreted languages? (Select three.) Answers:

• *Python


• *JavaScript


• *Ruby


• C#


• Java


• Pascal


• C++


Explanation:

Python, JavaScript, and Ruby are interpreted languages. C#, C++, Java, and Pascal are compiled languages. q_itf_languagesfacts_markup

Carlos is building a web page using HTML. The web page is not interactive and only contains static content. Which of the following language types BEST describes HTML?

Answers:

• *Markup


• Scripting


• Compiled


• Interpreted


Explanation:

HTML is a markup language and is generally not considered to be a programming language. The main purpose of HTML is to tell web browsers how to display static text on a screen.

HTML is not a scripting, compiled, or interpreted language. q_itf_languagesfacts_query

Pam is working with a database that contains all the product and customer orders for her company. Pam is using SQL to access the database to retrieve a customer's order. Which of the following BEST describes SQL?

Answers:

• *Query language


• Compiled language

• Object-oriented language


• Markup language


Explanation:

Structured Query Language (SQL) is a query language used to interact with databases. SQL is not a compiled, object-oriented, or markup language. q_itf_languagesfacts_scripting

Enrique, a web developer, is creating a new website for a customer and is using Ruby to provide dynamic content for the web pages. Which language type is he using?

Answers:

• *Scripting


• Compiled


• Assembly


• Machine


Explanation:

Ruby is a scripting language similar to Python and PERL. It is typically used to build web applications. Ruby is not a compiled language; it is interpreted.

Ruby is not an assembly language or machine language. q_itf_languagesfacts_sequence

Which of the following BEST describes a programming sequence? Answers:

• *A sequence of instructions that defines the input, processing, and output.


• A graphical representation of the program processes.


• A list of steps written in pseudocode.


• A list of subroutines used by a compiler.


Explanation:

A program is a sequence of instructions that define input, processing, and output. A flow chart is a graphical representation of a programming sequence.

Pseudocode is a way to represent code in a manner that's easier for a wide range of people to understand. A list of subroutines used by a compiler does not describe a programming sequence. q_itf2_pseudocode_else_if

What does the following pseudocode do when the input is 10? program DaysInMonth

declare number array dayspermonth = [31,28,31,30,31,30,31,31,30,31,30,31] declare number month get input "Enter a month" if month < 1 or month > 12 then display error else display "Number of days in month", month, "is ", dayspermonth[month] end

Answers:

• *31


• 30


• 28


Explanation:

The process of this pseudocode is as follows: Creates an array of numbers > A variable for the input is defined > Input is entered by the user > The input is checked to see if it is valid > Output is generated for the user

Input: 10

Output: Number of days in month 10 is 31 q_itf2_pseudocode_for_loop

What does the following pseudocode do if the input entered is 10, 12, 18, 4, 6? program calculateAverage

declare array of numbers n[5] declare number i

declare number average

get input from user "Enter 5 numbers to calculate the average" for (i=0; loop for 5 iterations; increment i)

average = average plus n[i] end

average = average divided by 5

display "The average is", average ;displays the average Answers:

• *10


• 12


• 50


• 25


Explanation:

The process of this pseudocode is as follows: Creates an array that holds 5 numbers > Declares a variable to keep track of the number of times in the loop > Declares a variable to store the average > Gets 5 numbers from the user > Loops 5 times > Adds the 5 numbers > Calculates the average by taking the total and dividing it by the number of items > Displays the average

Input: 10, 12, 18, 4, 6

Output: 10 q_itf2_pseudocode_infinite_loop

Maria is working on the design for a program and has created the following pseudocode. What is the result of this pseudocode?

declare loanBalance as a decimal value equal to 0.00 declare loanLimit as a decimal value to 1000.00 declare withdrawal as a decimal value

While loanBalance >= 0 input withdrawal

loanBalance equals loanBalance + withdrawal print loanBalance

Loop Answers:

• *It results in an infinite loop.


• It displays the loan balance each time a withdrawal is made.


• It stops processing withdrawal input after 1000.00 is reached.


Explanation:

loanBalance will always be equal to or greater than 0, and this creates an infinite loop because the While loop will always be true.

8.3 Programming Fundamentals Section Introduction

As you study this section, answer the following questions:

• How do loops help to automate repetitive tasks?


• Why is it important to keep code DRY?


• What kinds of information can be stored in a variable?


In this section, you will learn to:

• Compare and contrast fundamental data types used in computer programming.


• Describe the purpose of programming constructs such as variables, arrays, and functions.


• Describe the purpose of programming logic, including branching and looping.


• Place lines of pseudocode in the proper order to achieve desired functionality.


• Use JavaScript to do the following: o Create, initialize, change, and then display the value of a variable.


o Use an if…else statement to execute lines of code when certain conditions are true.


o Use a for loop to execute a block of code a certain number of times.


o Use a while loop to continue executing a block of code while certain conditions are true.


o Create and initialize the elements of an array.


o Display a specific array element based on an index.


o Use a for loop to evaluate each element of an array.


o Define and call a simple function.


Key terms for this section include the following:

Term Definition


Data type

An attribute attached to a value that tells the compiler or interpreter how the data should be used.

Identifier

A user-defined name of a program element, such as a variable or constant.


Container

A program element, such as an array or vector, that holds a set of values.


Function

A computer routine or snippet of code that can be reused in a computer program.


Flowchart

A visual representation of the logic in a program.


Branching

The logic in a program that tells the computer to execute a specific part of the program rather than executing statements one-by-one, in order.


Looping

The logic in a program that tells the computer to repeatedly execute a sequence of instructions until a condition is reached.


Algorithm

Specific, step-by-step procedures that illustrate how a problem will be solved.


8.3.1 Fundamental Data Types (Lesson Video) Transcript:

In this video, we'll learn about data types in computer programming. Basically, a data type is an attribute attached to a value that tells the compiler or interpreter how the data should be used. Each programming language has a slightly different set of data types. In this video, we'll look at a few that are common to most languages.

First, let's talk about numbers. The integer data type is used for whole numbers. These include both positive and negative numbers, as well as zero. The float data type is used for numbers that have decimal places. It's called "float" because the computer stores two values behind the scenes: the digits in the number and the location of the decimal point, which can "float" around to any location within the number.

Now let's look at text. The character type can store a single text character. To store more than one character, such as a word or sentence, you'd use the string data type.

Finally, let's look at the Boolean data type, which consists of exactly two values: True and False. This is especially useful when dealing with things that can be in one of two states, such as a light that can be turned on or off, a door that can be open or shut, or a user that's logged in or logged out.

In this video, we learned about some common programming data types. We looked at integers, floating-point numbers, characters, strings, and Booleans.

8.3.2 Variables and Arrays (Lesson Video) Transcript:

Computer programs often need to remember data to use later. For example, online banking software needs to keep track of the user's name, their account balances, and whether they're logged in. In this video, we'll learn about three ways programs can store data in memory: Variables, constants, and arrays.

A variable is like a container that can hold onto numbers, words, phrases, and other values. As the name suggests, they can also change the values they're holding.

In our simple banking example, the code may take the username entered by the user and store it in a variable called "username." This pseudocode shows how this could work. Using the assignment operator, or equals sign, the program sets the value of username to be whatever the user typed into the username field when they logged in. Later in the code, the programmer can type the name of the variable to access its value.

To get an account balance, the program sends a query to the bank's database, which works behind the scenes and returns the value of the balance. To keep track of this value, the program can use another variable, which we'll call

checkingBalance. If the balance changes because of a deposit or withdrawal, the program can keep track of the changes by adjusting the value of the checkingBalance variable.

Variables can also store Boolean values. Here's a variable called isLoggedIn, which keeps track of whether the user is signed into their account. When the user logs in, this variable will store the value true. When they log out, it will change to false.

Every once in a while, a programmer may want to keep track of a value that will never change no matter what. For example, a physicist may want to keep track of the value of pi with fifteen significant figures. Since this will never change, they can use a constant. A constant is a container that keeps track of values, but unlike a variable, constants can never change – once they're set, they're set for good. With this constant, the physicist can just type out the name of the constant instead of the whole long number.

Next, let's talk about arrays. An array is a special kind of variable that can hold onto many values at the same time. In our banking example, the program could query the bank's database to find the user's transaction history. Since there are many values to keep track of, the program uses an array to store them all in a single variable, rather than needing a separate variable for each value.

One of the reason arrays are so useful is that they are iterable, which means you can use a loop to access all the values one at a time. When the user wants to see the transaction history, the program can use a for loop to display each value in the array to a list.

In this video, we learned about three ways computer programs can keep track of data: variables, constants, and arrays.

8.3.3 Programming Logic (Lesson Video) Transcript:

In this video, we'll learn about two ways programmers can add logic to their programs: branching and looping.

By default, computer programs start at the first line, then execute one line at a time until the end. However, many programs need to change their behavior based on user input or other circumstances. This is called branching. Let's look at a common example.

This is pseudocode for an online store. Right here, the program is watching for the user to click "Add to cart." When they do, it checks to see whether the user is logged in. If they are, the code adds their item to the cart and suggests similar items. If they aren't, they get redirected to the login page. This type of conditional branching is typically made up of IF- ELSE statements inside the program. In our example, if the user is logged in, the program runs the code under the IF statement. Otherwise, it runs the code under the ELSE statement.

One thing computers excel at is doing the same thing over and over in exactly the same way. In programming, this is called a loop.

First, we'll talk about "for" loops, which run a specific number of times. Let's say our user has added a few more items to their shopping cart and is ready to check out. When they go to the checkout page, the computer will loop through the items in the cart. "For" each item, it will display the item name to the list and add the price to the running total. The number of times the loop runs is determined by the number of items in the cart. After the last item, the loop stops.

Next, let's look at "while" loops, which keep running as long as a certain condition is met. This example is from a card game. The block of code here says "while cardsInHand < 5." When the program gets to this block, it'll check the number of cards in the player's hand. If it's less than 5, it'll remove a card from the deck and put that card into the player's hand. Then, it'll loop back to the top and check again. If the number of cards in hand is still less than five, it'll deal another card. Once the player has five cards, this condition is no longer met, so the loop stops running.

In this video, we learned about branching, which changes how a program runs depending on user input and other conditions. We also looked at two kinds of loops: for loops and while loops.

8.3.4 Programming Logic Facts

Programmers use logic to instruct a computer on how and when to perform certain tasks.

The following table summarizes ways programmers work logic into the design and implementation of their code, including flowcharts, branching, looping, algorithms, operators, procedures and functions.

Table 1: Logic TERM DESCRIPTION


Flowcharts

The main purpose of flowcharts is to visually represent the flow (sequence) of logic in a program. An advantage of using flowcharts is that they make programming logic easier to read, especially for those who have little experience with

programming. Flowcharts allow you to visually follow the sequence of steps the program takes. The following are important symbols associated with flowcharts:


• .. Pill Shape - Pill shapes represent the start or end of a program.


• . Parallelogram - Parallelograms represent input or output.


• . Diamond - Diamonds represent decisions answered with a Yes or a No.


• . Rectangle - Rectangles represent processes.


• . Arrow - Arrows determine the logical flow of the program.


Branching

By default, computer programs start at the first line, then execute one line at a time until the end. However, many programs need to change their behavior based on user input or other circumstances. This is called branching. Consider the following common example. In the pseudocode (the plain language description of what the code is doing), the program is watching for the user to click Add to cart. When they do, it checks to see whether the user is logged in. If the user is, the code adds the item to the cart and suggests similar items. If not, the user gets redirected to the login page.

This type of conditional branching is typically made up of IF-ELSE statements inside the program. In the example, if the user is logged in, the program runs the code under the IF statement. Otherwise, it runs the code under the ELSE statement.


Looping

One thing computers excel at is doing the same thing over and over in exactly the same way. In programming, this is called a loop. There are two main types of loops: for loops and while loops.

• For loops run a specific number of times. Using the online store example: o The user adds a few more items to the shopping cart and is ready to check out.


o On the checkout page, the computer loops through the items in the cart, running the for loop for each item.


o It displays the item name to the list and adds the price to the running total.


o The number of times the loop runs is determined by the number of items.


o After the last item, the loop stops.


• While loops keep running as long as a certain condition is met. Consider the following example from an online card game. o The game has a block of code that says while cardsInHand < 5.


o When the program gets to this block, it checks the number of cards in the player's hand.


o If it's less than 5, it removes a card from the deck and puts that card into the player's hand.


o Then, it loops back to the top and checks again.


o If the number of cards in hand is still less than five, it deals another card.

o Once the player has five cards, this condition is no longer met, so the loop stops running.


Algorithms

Algorithms are specific, step-by-step procedures that illustrate how a problem will be solved. They include all the necessary logic, such as conditional statements, branches, and loops. Before they are implemented in code, algorithms are often expressed in flowcharts or in pseudocode.


Operators

Just as there are operators in a math sentence that specify what to do with the numbers, there are operators in code. Each coding language has its own operators. For pseudocode, there are some basics to be familiar with. Relational operators:

• == is equal to. This means it returns TRUE if both conditions are the same.


• = is equal to.


• != is not equal to.


• > greater than.


• < less than.


• >= greater than or equal to.


• <= less than or equal to.


Logical operators (used to test multiple conditions simultaneously):

• AND - If both statements are TRUE, the whole statement is considered TRUE.


• OR - If either condition is TRUE, the whole statement is also considered TRUE.


• XOR - If only one of the conditions is TRUE, the whole statement is considered TRUE.


• NOT - The whole statement is not TRUE.


Pseudocode of other programming languages:

• && - If both statements are TRUE, the whole statement is considered TRUE.


• || - If either condition is TRUE, the whole statement is also considered TRUE.


• ! - The whole statement is considered not TRUE.


Other keywords:

• START - Starts the pseudocode.


• INPUT - Data provided through a keyboard or other input device.

• GET/READ - Input taken from a data file.


• PRINT/SHOW/DISPLAY - Displays output on the screen.


• SET/INIT - Initializes values.


Comments

As you write your code, it is very helpful to document what the sections of the code do. This way when you or a coworker come back to update or troubleshoot the program, you can easily see what was intended. When adding comments, keep in mind:

• To add documentation within the program itself, you must use a comment symbol or delimiter.


• This symbol may vary, depending on the program being used, but common comment symbols include the hash (#), an apostrophe ('), or double forward slashes (//).


• Lines of code that are preceded by a comment symbol are ignored by the program when the code is run.


Procedures and Functions

The purpose of pseudocode is to explain in a concise and easily understandable way what the code will do. It should be easy for another programmer to understand and follow. Be


sure to eliminate any extra or confusing statements. Often you can use the same segment of pseudocode multiple times. Programmers learn quickly that it is a time-saver to reuse code. The code that you reuse repeatedly is called a procedure or a function.

• Procedure - A specific piece of code that can be reused without creating any output and without needing input.


• Function - A specific piece of code that can be reused, but requires input and output.


8.3.5 Functions (Lesson Video) Transcript:

One of the principles of software development is to keep your code DRY, which stands for Don't Repeat Yourself. The opposite of DRY is WET: Write Everything Twice. One way to keep your code DRY is to use loops – instead of writing a line of code for every single value in an array, you can use a loop to access all the values with just a few commands.

Another tool for keeping your code DRY is to use functions. Functions are snippets of code that you can write once, then reuse whenever you need them.

In this example, we're writing code for a video game. In the game, the character can jump and hit question mark blocks with his head. When this happens, we want to play a chime noise, add a coin to the player's stash, and remove the question mark from the block. We could write this code for each block individually, but a much better way to do it would be to use a function. Let's give the function a name, hitBlock, then write the code we want the function to execute. Once the function's written, all we have to do is call the name of the function whenever a block is hit instead of rewriting the whole chunk of code every time.

For extra DRYness, we can go one step further and put all the blocks into an array, then use a loop to call the hitBlock function for each one.

Next, let's look at two features that make functions even more versatile – arguments and return values. For this example, we're working on an adventure game. We want to write some code that adjusts a monster's total health whenever the hero hits it with her weapon. After naming the function, we'll ask for two arguments – the damage value of the hero's current weapon, and the current hit points of the monster. Then, we'll tell the function to return the monster's remaining health, which is its current HP minus the weapon damage.

Now that we have the function written, let's talk about it. These parameters are placeholders for actual values we'll eventually want to use. When we call this function, we'll pass in two arguments, which in this case are actual numbers. This gives the function flexibility to be used with a variety of weapons and monsters – all we have to do is change the arguments. The return statement says what the function's output should be. In this example, the output is the remaining health of the monster after it's taken a hit.

Now, let's put our function to work. Our hero is equipped with a harpoon, which deals four damage per hit. She's fighting a werewolf that currently has 20 HP. Both of these values are stored as variables. Whenever she scores a hit, the program calls the hitMonster function and passes in the two variables as arguments. The function plugs in the arguments, performs the calculation, then returns the new value, which in this case is 16. Using the assignment operator, or equals sign, we can capture the function's output in the HP variable. Because we're using a function, we can use this same code over and over until the werewolf is finally defeated.

In this video, we learned about functions. We also learned about two important features of functions: arguments and return values.

8.3.6 Using the JavaScript Code Visualizer (Demo Video) Transcript:

In this video we'll learn how to use the code visualizer activities. On the left, we have a short snippet of JavaScript code. We can use these dropdowns to change some of the values. When everything's set, click Start.

The visualizer will walk through the code step by step. Over here, it highlights the piece of code that is currently being executed. On the right is a detailed description of what's going on. To move on to the next step, click this arrow.

In this step, the program declared a new variable and set its value to 0. The current value of the variable is shown here. We eventually get to a console log statement, which writes text to the console. We can see the console output down here. As you move through the code, be sure to read the explanations. Take all the time you need to really understand what's going on and why the code is behaving the way it is. It may be helpful to pause and figure out what you think will happen next, then click the arrow to check if you were right. If you want to review a previous step, click the left arrow to go backwards.

If you want to view the code with new values, click Reset. From here, you can adjust the dropdowns, then start again. To score points for the lab, click here and answer the questions. If you need to review the code to answer a question, you can click here to get the questions box out of the way. When you think you have the correct answers, click Score Lab.

8.3.7 JS Code Visualizer: If...Else Statement (Simulation) Scenario

This activity will demonstrate if-else logic. This kind of logic is used to make the code execute differently depending on the circumstances. Use the dropdown to experiment with different variations of the code.

Explanation

Which of the following values of "score" will cause the else block to run?

• The else block will only run if the condition in the if block is false. The only way to make that happen is for the value of "score" to be lower than the value of "passingScore", which is 70.


If the value of "score" is set to 70, what is the output?

• The logical test for the if statement wants to know if the value of "score" is greater than or equal to the value of "passingScore" (70). Since 70 is equal to 70, this condition is true. The if block runs, and the else block gets skipped.


8.3.8 JS Code Visualizer: For Loop (Simulation) Scenario

This activity will walk you through a for loop step by step. Loops are used to do repetitive tasks many times with only a few lines of code. Use the dropdowns to experiment with different variations of the loop.

In this example, the code displays the value of the counter variable “i” for each iteration of the loop. When the logical test stated at the beginning of the loop is no longer true, the console displays a message to let us know the loop has

stopped executing.

To score points for this activity, click Questions in the top-right corner of the screen and use the code visualizer to determine the correct answers.

Explanation

If the comparator is set to i < 5 and the iterator is set to i++, how many times does the loop run?

• The loop will run as long as the value of i is less than 5. The first iteration, i is equal to 0. The second iteration, i is equal to 1. During the fifth iteration, i is equal to 4. After the loop runs, the iterator changes the value of i to 5. Since i is no longer less than five, the loop terminates, having run five times.


If the iterator is set to i--, what is the maximum number of times the loop will run?

• A for loop will continue to run as long as the condition in the comparator is true. If the value of i gets lower each iteration, there is no way the condition in the comparator will ever be false, so the loop will run forever until it is stopped or interrupted, such as by closing the browser window or turning off the computer.


8.3.9 JS Code Visualizer: For Loop with Array (Simulation) Scenario

One of the most common uses of a for loop is to do something to each item in an array. This activity will demonstrate a for loop that iterates through an array. Use the dropdown to experiment with different variations of the loop.

In this example, the code uses a loop to display a list of people’s names that are stored in an array. The code uses the length of the list to determine when to stop executing the loop. A message is displayed to let us know when the loop has terminated.

To score points for this activity, click Questions in the top-right corner of the screen and use the code visualizer to determine the correct answers.

Explanation

What happens when the program is instructed to log name[3] to the console?

• Arrays are zero-indexed, which means the first item is number 0, the second is number 1, and the third is number 2. Since the name array has only three items, there is no value stored in name[3]. The program prints "undefined" to the console, then continues.


What is the value of name.length?

• The length of an array is found by counting the number of items in it. Since the name array has three items, its length is 3.


8.3.10 JS Code Visualizer: While Loop (Simulation) Scenario

This activity will walk you step-by-step through a while loop. Loops are used to do repetitive tasks many times with only a few lines of code.

In this example, the loop will go through each item in an array of foods. As long as the food isn't "Beets", the loop will display a message letting us know which food we ate. However, if the food is "Beets", the loop will terminate and move onto the last line of code. Which is good, because beets are gross.

To score points for this activity, click Questions in the top-right corner of the screen and use the code visualizer to determine the correct answers.

Explanation

How many times does the code inside the while loop run?

• The code inside the while loop only runs if the value of foods[i] is not equal to "Beets. At first, the value of i is 0, and the value of foods[0] is "Apple." The second time around, the value of i is 1, and foods[1] is "Banana". The third time, the value of i is 2, and foods[2] is "Kiwi". On the fourth iteration, the value of i is 3, and foods[3] is "Beets". This means the loop terminates and moves on, having iterated three times.

What is the value of foods[2]?

• Arrays are zero-indexed. This means the first item in an array is item 0, the second is item 1, and so on. Since foods[2] represents the third item in the foods array, its value is "Kiwi".


8.3.11 JS Code Visualizer: Function (Simulation) Scenario

This activity will demonstrate a function. Functions make it so the same lines of code can be used and reused without having to be rewritten. Use the dropdown to experiment with different variations of the code.

In this example, a simple function is created to square a number, which means to multiply the value of a number by itself. The code creates a variable, assigns it a value, and then passes this number to the “square” function, which returns the value of that number multiplied by itself. Another variable stores and then displays the number that is returned by the function.

To score points for this activity, click Questions in the top-right corner of the screen and use the code visualizer to determine the correct answers.

8.3.12 Writing JavaScript Code (Demo Video) Transcript:

In this video, we'll learn how to use the JavaScript drag-and-drop activities. On the right, we have some JavaScript code. To see the output of this code, click Execute. Right now, we get an error message. This is because the code is currently incomplete. We can fix this by dragging one of these code options into the blank space. Now we can click Execute again to see the results of the new code. If you need a hint, you can click this debug button, then hover over the exclamation point.

You can also click the button at the bottom of the instructions to view what the final output of the code should look like. Feel free to experiment with different options and execute variations of the code to see what happens – you can always go back to the beginning by clicking Reset. When you're done experimenting and think you have the right answer, click Score.

8.3.13 JavaScript: Create an If...Else Statement (Simulation) Scenario

In this scenario, you’re working on the phone routing system for a small business. When someone calls, they’ll be prompted to enter a number to indicate the reason for their call. The number they enter is stored in a variable called dialedNumber . The output of the code depends on the value of the dialedNumber variable. To complete this lab:

• Set the value of dialedNumber to make the output show the office hours of the Mapleton location.


Explanation

Drag the 3 to the dialedNumber variable.

8.3.14 JavaScript: Create a While Loop (Simulation) Scenario

In this scenario, you’re working on an adventure video game. The program uses two variables to determine when a monster is defeated. The monsterHealth variable stores the current health of the monster. The weaponDamage variable stores the number of health points the monster loses when it gets hit. As long as the monster has any health remaining, the program should continue “hitting” the monster by printing the damage done to it and its current health. If the monster has no remaining health, the program should instead print “You defeated the monster!” To complete this lab:

• Add the correct logical statement to the comparator.


Explanation

Drag monsterHealth > 0 into the while loop.

8.3.15 JavaScript: Create a For Loop (Simulation) Scenario

In this lab, you will create a for loop that uses the variable i to count by fives from 0 to 50. To complete this lab:

• Add a value to the comparator to make the loop iterate the correct number of times.


• Add a value to the console.log so the program displays every fifth number from 0 to 50.

Explanation

From top to bottom, the correct draggables are:

1. 11


2. i * 5


8.3.16 JavaScript: Loop Through an Array (Simulation) Scenario

In this scenario you’re working on a shopping cart for an online store. The prices of each item in the cart are stored in an array called shoppingCart . As the program calculates the total cost of all items in the cart, it displays a running total after each item is added. When all items have been added, it displays the total cost. To complete the lab:

• Make the code correctly loop through the array and add the cost of each shopping cart item to the total price.


Explanation

Drag the i into the available space.

8.3.17 JavaScript: Define and Call a Function (Simulation) Scenario

In this lab, you’re creating a function that will find the difference between two numbers. The function is called three times (lines 1-3) and is defined at the bottom. When complete, the function should subtract the second argument from the first, then log the result to the console. To complete this lab:

• Add parameters to the function to make it work correctly.


Explanation

From left to right, the correct draggables are:

1. a


2. b


8.3.18 Section Quiz (Section Quiz) q_itf2_logic_01

On a flowchart, which of the following represents a decision? Answers:

• Parallelogram


• *Diamond


• Rectangle


• Arrow


Explanation:

Diamonds represent decisions answered with a Yes or No. Parallelograms are used for input or output.

Rectangles are used for processes.

Arrows are used to determine the logical flow of a program. q_itf2_logic_02

Which of the following BEST describes a flowchart? Answers:

• *It is a visual representation of the logic in a program.


• It starts at the first line and then executes one line at a time until the end.


• It does the same thing over and over in exactly the same way.


• It is a step-by-step procedure that illustrates how a problem is to be solved.


Explanation:

The main purpose of flowcharts is to visually represent the flow of logic in a program.

One thing computers excel at is doing the same thing over and over in exactly the same way. In programming, this is called a loop.

By default, computer programs start at the first line and then execute one line at a time until the end. However, many programs need to change their behavior based on user input or other circumstances. This is called branching.

Algorithms are specific, step-by-step procedures that illustrate how a problem is to be solved. q_itf2_logic_03

What is the term for code that keeps running as long as a certain condition is met? Answers:

• For loop


• *While loop


• Branch


• Decision


Explanation:

One thing computers excel at is doing the same thing over and over in exactly the same way. In programming, this is called a loop. There are two main types of loops: for loops and while loops.

• For loops run a specific number of times.


• While loops keep running as long as a certain condition is met.


By default, computer programs start at the first line and then execute one line at a time until the end. However, many programs need to change their behavior based on user input or other circumstances. This is called branching.

Diamonds represent decisions answered with a Yes or No in a flowchart. q_itf2_logic_04

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?

Answers:

• A constant


• A variable


• *An array


• A float


Explanation:

There are three ways programs can store data in memory:

• A variables is like a container that can hold onto numbers, words, phrases, and other values.


• A constant is a container that keeps track of values. But unlike a variable, constants can never be altered after they are set the first time.


• An array can hold onto many values at the same time.


The float data type is used for numbers that have decimal places. q_itf2_logic_and_or

Given the following pseudocode, which of the following is displayed if the user enters 4? declare number guess

input "Guess a number between 1 and 10?" if guess <= 1 || guess >= 10

display "Your guess is not valid." else if guess >=1 && guess <= 10 display "Your guess is valid." else

display "Error." end

Answers:

• *Your guess is valid.


• Your guess is not valid.


• Error.


• No output.


Explanation:

The || (or) logical operator only requires one of the two conditions to be true. The && (and) logical operator requires both conditions to be true.

The evaluation of else if guess >=1 && guess <= 10 will be true for any input that is greater than or equal to 1 and less than or equal to 10. Therefore, if 4 is entered, the prompt of "Your guess is valid" will be shown.

The prompt of "Your guess is not valid" will only be shown if the number is zero or greater than 10, as indicated by the evaluation of if guess <= 1 || guess >= 10.

q_itf2_logic_array

A programmer is developing a program that will list the order history for a customer. Which of the following data structures is the BEST one to use?

Answers:

• *Array


• Function


• Constant


• Variable


Explanation:

An array is a data structure that stores fixed-size elements of the same data type. It is ideal for things like order histories or bank transaction histories.

A function is a computer routine or snippet of code that can be reused in a computer program. A function does not store

data like an array. A function would be used to access an array, such as iterating through an array to display the order history on a page.

A constant is an identifier used to store a single value that does not change. A variable is an identifier used to store a single value. q_itf2_logic_attribute

Give the following example of a class, which of the following represent an attribute?

DriversLicense name: string birthdate: number height: number eyeColor: string valid()

expired() Answers:

• *eyeColor: string


• valid()


• expired()


• weight: number


Explanation:

eyeColor: string is an attribute of the class. valid() and expired() are methods.

weight: number is not listed as part of this example. q_itf2_logic_branching

Martin, a software developer, is working on a programming function that takes input and displays a message based on which input the user enters. The input is the primary colors, red, blue, and green. Which is the BEST programming construct to use?

Answers:

• *If


• Constant


• Variable


• Object


Explanation:

An if statement provides branching and can display a different message based on the input value. Constant is a variable that stores a fixed value.

A variable stores a value that can change.

An object is used in object-oriented programming and does not meet the criteria given. q_itf2_logic_function

Alex is creating a loan program and need to use a program sequence repeatedly to calculate the interest for different loans.

Which of the following is the BEST programming concept to accomplish the task? Answers:

• *A funtion


• An array

• A container


• A boolean loop structure


Explanation:

q_itf2_logic_method

A method is declared within a class. Which of the following would be an example of a method for a Car class? Answers:

• *Start engine


• color


• style


• wheels


Explanation:

Start engine is an example of a class method. Color, style, and wheels are examples of attributes. q_itf2_logic_not

When programming a while statement, it is sometimes useful to use a logical NOT operator. The logical NOT operator reverses the logical state of an operand so that if the condition is normally true, the logical NOT operator makes it false. Which of the following is an example of a logical NOT operator?

Answers:

• *!(var1 && var2)


• (var1 || var 2)


• (var1 = var2) || var3


• ~var1


• NOT(var1 || var2)


Explanation:

The logical NOT operator is represented by the exclaimation point (!), and !(var1 && var2) shows the correct use.

|| represents a logical OR.

&& represents a logical AND.

~ and NOT do not represent a logical NOT operator. q_itf2_logic_object

Object-Oriented Programming (OOP) is a newer approach to programming where functionality is divided into smaller groups of tasks and actions. With OOP, you can model real world objects in a programming language. There are two main concepts. The first is like a template, and the second is the specific models built from the templates. What are these two concepts called?

Answers:

• *Classes


• *Objects


• Methods

• Attributes


• Properties


• Values


Explanation:

Two of the most important object-oriented programming concepts are classes and objects. A class is like a template. Objects are the specific models built from a class.

Classes also contain methods, which are lines of code that perform specific operations.

Classes contain properties, which are the attributes or characteristics that objects can hold as fields or private variables that other programs cannot changed or access directly. Methods are used to make changes to attributes.

Values are the actual data being represented. q_itf2_logic_properties

Classes contain properties, which are the attributes or characteristics that objects can hold as fields or private variables. Which of the following is TRUE about properties?

Answers:

• *Methods are used to read or write properties.


• Other programs can access and change properties directly.


• Properties in a class do not actually have the ability to store data in the fields or private variables.


• The properties are read-only, so there is no need to access them publicly.


Explanation:

Classes contain properties, which are the attributes or characteristics that objects can hold as fields or private variables that other programs cannot changed or access directly. Properties can be used as another way to access a field publicly. Methods are typically used to set (write) or get (read) properties.

q_itf2_logic_string

A programmer is developing an application that will store names and addresses (street, city, state, and zip code). The zip code must be able to accommodate alphanumeric characters to accommodate international zip codes, such as Canada.

Which data type should be used for the variable that will hold the zip code? Answers:

• *String


• Integer


• Float


• Char


Explanation:

String will accommodate alphanumeric data.

Integer will only work with numbers, not alphanumeric characters (specifically alphabetic characters). Float will only work with decimal numbers.

Char will only work with a single character. q_itf2_logic_variable_01

A programmer needs to store the input from a user so it can be used later in the program. Which of the following would be the BEST choice to accomplish this task?

Answers:

• *Variable


• Constant


• Function


• Method


Explanation:

A variable is like a container that can hold onto numbers, words, phrases, and other values. As the name suggests, they can also change the values they're holding.

A constant is a container that keeps track of values, but unlike a variable, constants can never change once they're set. A function is a computer routine or snippet of code that can be reused in a computer program.

A method (also known as a procedure, function, routine, or subroutine) receives input, generates output, and manipulates data. Methods are used to make changes to attributes.

q_itf2_logic_variable_02

When a programmer is using branching or looping, a comparison is made to determine the next instruction to execute. A credit score of 690 or above is considered good, and below 690 is considered poor and a greater risk to lend someone money.

In the following pseudocode, what would be the correct comparison operator to use? IF creditScore    690 THEN interest = 8%, ELSE interest = 18%.

Answers:

• *>=


• <=


• =


• <>


Explanation:

In this situation, the comparison should check for a credit score greater than or equal to 690 (>=) and assign a lower interest rate because they are less of a risk. A higher credit rate would be assigned to those with less than a 690 credit score.

<= means less than or equal to.

= means equal to.

<> is an older version of not equal. The ! symbol is more commonly used in its place. q_itf2_logic_variable_03

What is the result of the following pseudocode when the value of currentDistance is 6? declare hike = 12

if currentDistance < hike

display "Keep going, you can do it!" else if currentDistance >= hike display "Great job, you made it!" end

Answers:

• *Keep going, you can do it!


• Great job, you made it!


• Nothing. The comparison is never true.

• Syntax error.


Explanation:

The comparison of currentDistance < hike is 6 less than 12, which is true, so "Keep going, you can do it!" is displayed. If currentDistance was greater than or equal to 12, then "Great job, you made it!" would be displayed.

Given the value of 6, the statement evaluates to true and displays the message. Since this is pseudocode, there would never be a syntax error. q_itf2_logic_variable_04

What is displayed based on the output from the following pseudocode if the count is 42? declare number total = 32

declare number count while count > total count = count - 1 loop

display count Answers:

• *32


• 33


• 31


• 0


Explanation:

The comparison is checking to see if the count was greater. The total would be true until the count equals 32. 33 > 32 is true, so the loop would execute, and the count is now 32.

The loop would never execute if 32 > 32 was the comparison. The loop would never be true after that, so the value of 31 or 0 would never be reached.

q_itf2_logic_while_loop

When using an if...else statement or a while loop, a programmer must test for a certain condition to be true. In the following pseudocode example, which line contains the condition?

program guessMyFavoriteColor declare favoriteColor equal to Yellow declare guess

read guess from user

do while (guess does not equal favoriteColor) display "You guessed my favorite color"

else

display "That is not my favorite color" end while

end program Answers:

• *guess does not equal favoriteColor


• do while


• declare favoriteColor equal to Yellow


• end while

Explanation:

q_itf_logic_program_facts_01

After running the following pseudocode, what will the value of VARIABLE be?

1. Set value of VARIABLE to 5


2. Increase the value of VARIABLE by 3


3. If the value of VARIABLE is odd, increase its value by 1


4. If the value of VARIABLE is even, increase its value by 1


5. If the value of VARIABLE is odd, increase its value by 1


Answers:

• 8


• 9


• *10


• 11


Explanation:

Computers execute code one line at a time, from top to bottom. This explanation will follow the pseudocode step by step.

1: The value of VARIABLE is 5.

2: The value of VARIABLE is 5 + 3, or 8.

3: This line will only execute if the value of VARIABLE is odd. Since the current value of VARIABLE is 8, we skip this line.

4: This line will only execute if the value of VARIABLE is even. Since the current value of VARIABLE is 8, we execute this line. The value of VARIABLE is now 8 + 1, or 9.

5: This line will only execute if the value of VARIABLE is odd. Since the current value of VARIABLE is 9, we execute this line. The value of VARIABLE is now 9 + 1, or 10.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_logic_program_facts_02

Which of the following flow chart concepts is depicted below? Answers:

• *Sequence


• Arrays


• Vectors


• Methods


Explanation:

Sequence is a flow chart concept that shows a series of steps or decisions. Arrays, vectors, and methods are all programming concepts. q_itf_logic_program_facts_03

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping

cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?

Answers:

• *Branching


• Looping


• Programming array


• Encapsulation


Explanation:

Branching is a programming logic component used when a program needs to change behavior based on user input or other circumstances.

Looping is used when something needs to be done over and over in exactly the same way. A programming array is a data structure used to store values.

Encapsulation is based on the idea that some parts of a program's code should only be accessible by certain channels. q_itf_logic_program_facts_04

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

Answers:

• *Looping


• Branching


• Scripting


• Case statement


Explanation:

Looping provides the ability for a user to input a series of values.

Branching provides the ability to execute non-sequential code based on user input.

Scripting is based on the use of a scripting language such as PHP or JavaScript to extend the functionality of web pages or to perform simple tasks.

A case statement is used to execute specific code based on user input. q_itf_logic_program_facts_05

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?

Answers:

• *Algorithm


• Flowchart


• Pseudocode


• Software


Explanation:

Algorithms are specific, step-by-step procedures that illustrate how a problem will be solved. They include all of the necessary logic, such as conditional statements, branches, and loops.

The main purpose of flowcharts is to visually represent the flow of logic in a program. An advantage of using flowcharts is that they make programming logic easier to read, especially for those who have little experience with programming.

Pseudocode is programming instructions written using natural language rather than programming syntax. Software is a set of instructions and data programmed to tell a computer what to do. q_itf_logic_program_facts_06

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.)

IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%. Answers:

• *Branching


• *8%


• 7%


• Looping


• Query


Explanation:

Since the value is equal to 5,000, the IF-ELSE programming statement would first evaluate the IF statement to see if the amount is less than 5,000. Since 5,000 is not less than 5,000 but equal to it, the ELSE statement is evaluated and the value for interest is set to 8%. This is an example of branching, and the value returned is 8% based on the input value of 5,000. Branching is the logic in a program that tells the computer to execute a different part of the program rather than executing statements one-by-one, in order.

Looping is where instructions are repeatedly executed until a condition is reached.

A query is typically some type of input provided to a programming statement, such as an SQL query to a database.

8.4 Programming Paradigms and Processes Section Introduction

As you study this section, keep the following questions in mind:

• When does it make sense to use a declarative paradigm? When does it make sense to use a procedural paradigm?


• How can I conceptualize things in my life as programming objects?


• How does version control help development teams work together?


After finishing this section, you should be able to:

• Describe common programming paradigms, including declarative and procedural methods.


• Explain the advantages of object-oriented programming.


• Explain the basic principles of object-oriented programming, including encapsulation, inheritance, and polymorphism.


• Describe the role of an integrated development environment (IDE) and application programming interfaces (APIs) in building software applications.


• Explain how the following are used to manage, maintain, and deliver high quality software solutions: o Agile methods


o Version control


o Coding standards

o Testing standards


Key terms for this section include the following:

Term Definition


Programming Paradigm

A method a computer uses to solve a specific problem or perform a specific task.


Procedural Programming

A method that focuses on telling a computer what to do to reach a certain objective. It takes a linear, top-down approach to solving problems by creating routines and subroutines that perform computations.


Declarative Programming

A method that focuses on instructing a program what needs to be done instead of telling how to do it. Instead of giving the computer step-by-step instructions, the code simply says what the end result must be.


Object-Oriented Programming (OOP)

A programming paradigm based on the concept of objects which can contain both data and programming code.


Encapsulation

An OOP concept that describes how data and methods are bundled together within one unit or class.


Version Control Systems (VCS)

Software tools that help teams manage files and source code over time.


Integrated Development Environments(IDE)

A set of programming tools that work together to make a programmer's job easier.


Application Programming Interfaces (API)

A set of protocols and tools that help programmers build applications that connect or communicate with databases, operating systems, and other services.


8.4.1 Programming Paradigms

The word "paradigm" in Information Technology means a method used to solve a problem or perform a task. A programming paradigm is a method a computer uses to solve a specific problem or perform a specific task. Each paradigm has its own set of tools at the programmer's disposal, and they are generally used for different purposes, though they often complement each other.


Lines of computer code displayed on an open laptop. Photo by Clément H on Unsplash

Procedural Programming

The procedural programming paradigm focuses on telling a computer what to do to reach a certain objective. It takes a linear, top-down approach to solving problems by creating routines and subroutines that perform computations. It's sometimes also known as imperative programming.

The programmer splits his or her code into smaller units, called functions or procedures, so that they can be reused when the need arises. When the program is compiled, it's executed in a linear order, going to the first function, and then the second, and so on until the last function is executed. This kind of programming easy to write and understand, and it's often the first paradigm taught in introductory programming classes.

Declarative Programming

Declarative programming focuses on instructing a program what needs to be done instead of telling it how to do it. Instead of giving the computer step-by-step instructions, the code simply says what the end result must be. Examples of the declarative paradigm are markup languages like HTML, style sheet languages like CSS, and query languages like SQL.

8.4.2 Object-Oriented Programming (Lesson Video) Transcript:

Computer programmers often want to write software that has to do with real things in the world. For example, a program for selling concert tickets would want to keep track of customers, event venues, seats, and bands. Obviously, it's impossible to put real people and venues into a computer program. However, programmers can create models of these things to use in their programs. This idea of modeling real-world objects into computer code is called object-oriented programming. Some of the most common object-oriented programming languages are C++, Java, C#, and Python.

Two of the most important object-oriented programming concepts are classes and objects. A class is like a template. A programmer could specify that each customer in the program should have a name, an address, an account balance, and a transaction history. Classes also contain methods, which are lines of code that perform specific operations. For example, our class could have a method that prints the customer's information to the screen, and others that change the account balance and update the transaction history. Right now, all the methods and values are set to public. We'll talk about what that means later.

Objects are the specific models built from a class. In our example, each individual customer would be its own object. Just like the class, each one has a name, an address, an account balance, and a transaction history. We can also use the methods, which were written into the class, to change the account balance of each customer. Notice that each time we run the method, it updates both the balance amount and the transaction history, since that's what the class says the method should do.

One of the major benefits to object-oriented programming is the concept of encapsulation. Encapsulation is used to hide certain values inside a class to prevent uncontrolled access to them. Let's take another look at our Customer class. Right now, all these values are set to public. A public value can be changed from anywhere in the code, even outside the class. Whenever the account balance is changed, we want it to happen through the methods, since the methods also update the transaction history. Unfortunately, since these values are public, other parts of the code are free to directly adjust the balance without using the methods. That's a problem, because if this happens the transaction history won't update.

To correctly encapsulate the data, the programmer should make these values private but leave the two methods public. Now, other parts of the code are free to use the methods but don't have direct access to the values. With this setup, the only possible way to change the account balance is to use the two methods.

We've just taken a first look at object-oriented programming, which works by modeling real-world objects into code. We also learned about encapsulation, which prevents uncontrolled access to a class's values.

8.4.3 Version Control (Lesson Video) Transcript:

In a software development environment, the project's source code is a valuable asset that needs to be carefully managed and protected. If the code is compromised, the software could become slow, buggy, or stop working altogether.

Unfortunately, the more people you have working on a project, the more likely it is that something will go wrong. That's why almost all development teams use version control. Version control systems, or VCS, are software tools that help teams manage files and source code over time. In this video, we'll look at three ways VCS is helpful for software development.

The first way version control helps development is keeping track of the project's history. Every time you add, delete, or modify a file, the version control system keeps track of exactly what change you made and when. Why is that important? Well, suppose a developer is fixing a bug in a program. She makes some changes to a file, tests to make sure the fix worked, then saves the project. Unfortunately, she didn't realize that the changes she made would cause an even bigger unintended problem down the road. Because the VCS keeps track of all the changes, she can reset the file to the way it was before she modified it, then figure out a new fix for the original bug.

Another way version control helps is by making it easier to work with other people. Suppose you're working on a document with a colleague and you each have your own copy of the file. You make some edits in the first two

paragraphs, and your colleague edits the last two. To combine these changes, someone would have to compare both documents word-by-word and copy the changes over by hand.

With VCS, you and your colleague each download a copy of the original file from a central repository and make your changes. When you push your documents back to the repository, the VCS writes your changes into the original document. You don't have to worry about merging the different versions because the VCS does it for you.

Finally, let's talk about feature branches. This river represents the code base of a website. Right now everything's working just fine. However, we want to make some improvements to the homepage and the shop, and we don't want to introduce bugs to the site while we make the changes. Instead of making changes directly to the live code, VCS can create copies of the code base balled branches. The developers can make changes to the homepage on one branch and improve the store on another branch. While they work, the "master" branch remains unaffected, so the site still works as normal. Once work on the branches is finished and they've been tested for bugs, VCS can merge the branches back into the master code base.

In this video, we learned about version control systems. VCS helps software development by keeping track of a project's history, facilitating collaboration, and making branches for creating new features.

8.4.4 Integrated Development Environments

IDE stands for integrated development environment, which is a set of programming tools that work together to make a programmer's job easier. Some programmers work in simple text editors, but these don't include the same kind of robust tools that an IDE can provide. Many IDEs are tied directly to a particular programming language, such as Ruby or Java. This helps them to be as useful as possible to the programmer working in that specific language.

IDE Example


Lines of computer code shown in an IDE. Screenshot Using an IDE

A simple text editor usually does only one thing—it edits text. This allows you to use any programming language that you know. However, these kinds of editors don't offer support for different kinds of programming styles and languages like IDEs do. An IDE allows for faster coding with less effort and for different programmers to easily collaborate on the same project.

When considering an IDE, you should remember that there's going to be a learning curve associated with it. Because most IDEs are tailored to a specific programming language, no two will be precisely the same. This requires more effort to get up to speed on a new one.

It's important to remember that an IDE can make it easier to spot mistakes, but it can't fix all your errors for you. You still need to be able to spot them yourself as no software is foolproof.

Most IDEs include the following components:

• Text or code editor


• Project windows for convenience


• Compiler


• Debugger


• Language-specific features


Once you've learned how to use an IDE, it can greatly streamline your work. The following are some of the added features that many IDEs provide to programmers:

• Autocomplete key words


• Highlights syntax, making it easier to follow


• Supports external plug-ins


• Displays your execution results in a separate window

• Can organize your work into folders that keep your project orderly


8.4.5 Application Programming Interfaces

The term API stands for application programming interface. Programmers use APIs to connect or communicate with databases, operating systems, and other services. APIs define both protocols and tools for programmers to build applications. A web APIs is a specific type of API that governs the access points of a web server that receives requests and sends responses.

How Do APIs Work?


Illustrated diagram of how application programmers use APIs to comunicate with databases, operating systems and other apps.

An API is a bit like a restaurant menu. It includes a list of operations a system or site can perform and a description of each. When someone makes a request for one, the API delivers it to that user. A user doesn't need to know how a specific operation works; they only need to know what it's supposed to do. Developers save a lot of time by using APIs since they let the program take care of the nuts and bolts behind the scenes.

With web APIs, it's important to remember that the API is not the server itself. It's basically a collection of code that helps the server accomplish useful tasks. The creation of an API usually doesn't require any knowledge of HTML or CSS because it's stored in XML format or as a JSON file, which stands for JavaScript Object Notation.

One common API that's seen across a variety of websites is the OAuth API. This is an API that allows users to log into a website using a different account such as a Google, Twitter, or Facebook profile, even if he or she has never signed into the site before. This API can automatically create a new account for you based on your existing one. The next time you visit the site, you can easily log in again with the same account you previously used. You can also use an API to share content like blog posts on various social media.

Who Uses APIs?

Software developers use APIs to make their jobs easier. If you want to build an app for a particular operating system, such as Windows or macOS, that operating system will already have a large number of APIs that you can draw from in order to make things easier. For example, let's say you're building an app and want it to be able to take a photo using the phone's camera. That isn't something you need to code from scratch. The operating system should already have an API for this function which you can insert into your app and save yourself a great deal of time and effort.

APIs are also helpful because they always stay up to date. When your website uses an embedded Google Maps widget, it always returns the most up-to-date version. You don't have to constantly update the content yourself and the user experience is always consistent.

8.4.6 Activity: Basic Python Scripting

In this activity, you will utilize the random function in Python, which is a general purpose programming language that can be used in a wide variety of applications.

To complete the activity, perform the tasks listed in the following table: Table 1: Python Assignment Instructions

TASK STEPS


Open an Online Python Compiler

Open one of the following online Python compilers in your browser.

• Repl.it


• GDB Online


Enter Code to Create Random Password Generator

1. Delete any contents in the console pane of the Python compiler.


2. Enter the following code into the console pane.

import random

characters = "abcdefABCDEF1234!@#$"


length = 8

password = "".join(random.sample(characters, length)) print(password)


3. Click the "Run" or "Execute" button above the console pane.


4. Notice how a different password is generated each time you execute the code.


5. Try changing the number of characters in the password as well as which letter, number, and symbols are utilized to generate the password.


Enter Code to Simulate Dice Roll

1. Clear the previous code from the Python compiler and input the following. Be sure to use consistent indentation.


import random print("Roll the dice!") while True:

input("Press Enter to roll") roll1 = random.randint(1, 6) roll2 = random.randint(1, 6) print(roll1)

print(roll2)


2. Click the "Run" or "Execute" button above the console pane.


3. Notice how two different numbers are displayed each time you press Enter.


4. Press the stop button above the console pane to end the program.


5. To make sure you understand how this script works, add 2 more dice to the game and try it out.


Create Your Own Python Script

1. Write a script that can randomly select a classmate for a prize.


2. Utilize the random function and the random.randomint() function you used in the dice game to select a random number out of 30 students.

8.4.7 Activity: Basic JavaScript

In this activity, you will use an online JavaScript code generator to create a clickable button with an HTML pop-up alert and then customize the page and button.

To complete the activity, perform the tasks listed in the following table: Table 1: JavaScript Assignment Instructions

TASK STEPS


Open an Online JavaScript Editor

Open one of the following online JavaScript editors in your browser.

• W3Schools


• jsfiddle.net


• codepen.io


• Tutorials Point


Enter and Run Sample Code

1. Delete any contents in the left pane of the JavaScript editor.


2. Enter the following code into the left pane.


3. <body>


4. <h1>My JavaScript Button</h1> 5.

6. <script>


7. function celebrate() {


8. alert("You are coding with JavaScript!");


9. }


10. </script>


11.


12. <button onclick="celebrate()">Click me!</button>


13. </body>


14. Click the "Run Code" or "Preview" button at the top of the left pane.


15. In the right pane, you will see a button that says "Click Here!".

16. If you have entered the code correctly, a pop-up should appear on your screen after you click this button.


17. Click the "OK" Button to close the pop-up window.


Modify the Page Style

1. Enter the following code above the first line ( <body> ) that you have previously entered.


2. <style>


3. body {


4. background-color: beige;


5. text-align: center;


6. color: chocolate;


7. font-family: Arial;


8. }


9. </style>


10. Click the "Run Code" or "Preview" button at the top of the left pane and see what changes in the right pane.


11. Experiment with changing the colors, alignment, and fonts. What limitations do you find as you try different style options?


Customize the Button

1. Enter the following code just before the line that contains </style> .


2. button {


3. text-align: right;


4. height: 60px;


5. width: 200px;


6. background-color: GoldenRod;


7. border-radius: 10px;


8. border-width: 3px;


9. border-color: SaddleBrown;

10. }


11.


12. button:hover {


13. background-color: DeepPink;


14. cursor: pointer;


15. }


16. What changes do you see?


17. Try changing the different options to customize your button.


8.4.8 Section Quiz (Section Quiz) q_itf2_programParadigms_01

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?

Answers:

• *It uses a linear, top-down approach to solving problems.


• It uses a domain-specific language (DSL) to instruct the program what needs to be done.


• It uses a non-linear approach to solving problems.


• It uses high-level instructions instead of detailed steps.


Explanation:

The procedural, or imperative, programming paradigm takes a linear, top-down approach to solving problems. It does this by creating routines and subroutines to perform computations.

The use of a DSL and high-level instructions are features of the declarative programming paradigm. q_itf2_programParadigms_02

Which of the following describes the declarative programming paradigm? Answers:

• *It uses a domain-specific language (DSL) to instruct the program what needs to be done.


• It uses a linear, top-down approach to solving problems.


• It uses detailed steps to provide instructions to a computer.


• It uses local and global variables as data types.


Explanation:

Declarative programming focuses on instructing a program what needs to be done instead of simply telling it how to do

it. This means that you have to write your code in what is called a domain-specific language (DSL). A DSL is created to solve more particular coding problems as opposed to more general ones.

The procedural, or imperative, programming paradigm uses a linear, top-down approach. It encourages more specific instruction from the programmer and uses local and global data types.

q_itf2_ides_01

Which of the following can be used by a programmer to debug code? Answers:

• *Integrated development environment (IDE)


• Text editor


• Word processor


• Application programming interface (API)


Explanation:

IDE stands for integrated development environment. An IDE is a set of programming tools that all work together to make a programmer's job easier. A key feature of an IDE is that it provides a built-in debugger.

Text editors and word processors typically do not have code debuggers.

API stands for application programming interface. An API is the code that governs the access point of a server that receives requests and sends responses. It is a common tool used by large companies as a way to make their operations run more smoothly. Developers use APIs in order to create new user experiences, and end users benefit from the ease brought about because of APIs.

q_itf2_ides_02

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)

Answers:

• *An IDE can autocomplete key words.


• *An IDE has a library of built-in functions.


• An IDE allows for saving code with filename extensions.


• An IDE allows projects to be kept organized in folders.


• An IDE provides standard text-editing features.


Explanation:

IDEs are designed to autocomplete key words, and they contain built-in libraries that can greatly speed up development. All the other features are standard to any text editor and do not provide a performance advantage.

q_itf2_apis_01

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?

Answers:

• *Application programming interface (API)


• Integrated development environment (IDE)


• The C# programming language


• Cascading Style Sheets (CSS)

Google provides an application programming interface (API) that can be used to embed a map into a web page. An IDE is a coding environment with built-in tools that facilitate a programmer's job.

C# is a programming language. It does not provide access to Google Maps.

CSS is a scripting language that is used for the presentation and style of a web page. q_itf2_apis_02

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?

Answers:

• *Use the APIs for each operating system.


• Expand the development team to handle the additional work.


• Increase the timeline to allow for the additional work.


• Use the same programming language for both operating systems.


Explanation:

Software developers use APIs to make their jobs easier. If you want to build an app for a particular operating system, such as Windows or Apple iOS, that operating system will have a large number of APIs that you can draw from in order to make things easier.

Expanding the number of developers or increasing the timeline are not as effective as using a library of APIs.

Using the same programming language would be helpful. However, this is not always possible. Using APIs provides the best way to make development easier.

q_itf2_random_activity_01

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do?

color = input('What is your favorite color?\n') print('Your favorite color is %s.' % color) Answers:

• *It gets input and produces output.


• It sets the font color to the color specified in the input.


• It sends the output to a printer.


• It sets the system color variable.


Explanation:

The code gets input and produces output. The first line displays a question on the screen and waits for input. Once input is received, the variable color is set to the input. The second line displays the results of the input on the screen. q_itf2_random_activity_02

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

Answers:

• *import random


• export random


• load random


• set num = random()

To use a pre-built function that is part of the language, use the import command. The other commands are not used in Python.

q_itf2_js_activity_01

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

Answers:

• *JavaScript


• C++


• HTML


• CSS


Explanation:

JavaScript is the de facto programming language for adding interactive elements to web pages. C++ is a compiled programming language that is not typically used for website development.

HyperText Markup Language, or HTML, isn't a programming language. It is a markup language used to create the content and structure of a website.

CSS (Cascading Style Sheets) is a scripting language that adds colors, fonts, and other design elements to a website. q_itf2_js_activity_02

What does the following JavaScript code snippet do when the code is loaded in a browser? Answers:

• Displays a button labeled "Click me!"


• Displays a pop-up window with the message "You are coding with JavaScript!"


• Nothing, this code will not load in a browser


• *Displays the text "My JavaScript Button" and a button labeled "Click me!"


Explanation:

With this code snippet, the web page will display the text "My JavaScript Button" and a button labeled "Click me!" The message "You are coding with JavaScript!" will not appear until the button is clicked.

8.5 Web Development Section Introduction

As you study this section, keep the following questions in mind:

• How do frontend and backend technologies work together?


• What is the relationship between HTML, CSS, and JavaScript?


• Why is HTML called a "markup language"? Why is JavaScript considered a "programming language"?


After finishing this section, you should be able to:

• Identify and understand the purposes of HTML, CSS, and JavaScript in a web browser.


• Define frontend, backend, and full-stack development.


• Write HTML code to do the following: o Use <head> and <body> tags to create a web page.

o Use <div> tags to divide a web page into sections.


o Use <h> tags for web page headings.


o Use <p> tags for web page paragraphs.


o Use <a> tags for hyperlinks.


o Use <ul>, <ol>, and <li> tags to create bulleted and numbered lists.


o Use <img> tags to insert images into a web page.


o Add a caption to an image.


o Link to an external CSS style sheet.


• Write CSS style sheets to do the following: o Resize an image to match the size of its <div> wrapper.


o Center a line of text.


o Italicize text within a <span> tag.


o Specify a particular font family for all text on a page.


o Change the font color of headings.


o Add padding to a page element.


o Add a drop-shadow to an element.


o Modify the background color of an element.


• Use JavaScript to add functionality to a button on a web page.


Key terms for this section include the following:

Term Definition


Frontend Development

Programming development that creates the things users see and interact with on a website.


Backend Development

Programming development that handles the behind-the-scenes work of a website that's not apparent to the average user. This includes serving content to users, managing user accounts, and accessing information from databases.

Hypertext Markup Language (HTML)

A markup language interpreted by web browsers.


Cascading Style Sheet (CSS)

A file associated with a web page that describes how HTML elements are to be displayed.


JavaScript

A programming language commonly used to create interactive effects within a web browser.


8.5.1 Web Programming Overview (Lesson Video) Transcript:

Web development involves creating, deploying, and maintaining resources on the World-Wide Web. Websites, browser- based email services, and online applications like this course are created by web developers. Web development tasks are divided into two broad categories – frontend and backend. In this video, we'll look at each, then discuss how they work together.

Frontend development has to do with things you see in your web browser when you visit a site. Frontend developers use HTML, CSS, and JavaScript to determine the way the website looks and functions.

One of the major focuses of frontend development is making the website as user-friendly as possible. Good websites present information in a way that's logical and easy to read. Navigating a site, finding resources, and accessing information should be easy and intuitive. Frontend development is also concerned with the aesthetics of a website. They should feel cohesive with a consistent color palette and sensible font choices.

This task is greatly complicated by the fact that websites appear differently on different devices, such as laptops, monitors, tablets, and smartphones. This requires a great deal of quality assurance testing to be done in order to make sure the site looks its best across these many different formats.

Backend development handles the behind-the-scenes work of a website that's not apparent to the average user. These are like the moving parts inside a machine that do much of the heavy lifting but are not obvious to an outside observer.

Serving the website to users, managing user accounts, preventing unauthorized access, and accessing information from databases are all backend tasks.

While frontend developers are mostly limited to HTML, CSS, and JavaScript, backend developers have a wide variety of languages at their disposal. They may use Ruby, Java, PHP, and Python, not to mention query languages like SQL.

Web developers or programmers who have the skills to work with both the frontend and backend of a website are called full stack developers.

Every website you've ever visited is a result of frontend and backend technologies working together. Let's look at an example. Suppose you click on a hyperlink to go to a website. Clicking the link generates a request to the website's server. The server processes the request and sends the website file to your browser. To log in, you enter your username and password into a frontend form. On the backend, your input is matched with your user account in a secure database. Information from your account is retrieved, sent back, and loaded into your browser's frontend.

In this video, we looked at web development. Frontend development creates the things you see in your browser, and backend development handles everything behind the scenes.

8.5.2 HTML, CSS, and JavaScript (Lesson Video) Transcript:

In this video, we'll go over three computer languages that work together to create websites and web applications, including the one you're using right now. They are HTML, CSS, and JavaScript. We'll give a brief overview of each one and show how they work together to create a cohesive website.

HTML stands for Hypertext Markup Language. Hypertext is a system that links digital objects to each other so when you click the linking object, the linked object can be viewed. If you've ever followed a link on the Internet, you've already seen this in action.

As the name suggests, HTML isn't programming language, but a markup language. It works by adding tags to text, which the web browser interprets to display the content we see on a webpage. Let's look at a few examples. In this example, the words "Hello World!" are contained inside a <strong> tag. Most tags have two parts – the opening tag, which is surrounded by angle brackets, and the closing tag, which has angle brackets and a forward slash. If this line were loaded into a web browser, the browser would display Hello World! in bold letters. Other common tags are the <p>

tag, which formats text as a paragraph; the <a> tag, which creates a hyperlink; and the <h1> tag, which designates text as a first-level heading.

To be a proper HTML document, there are a few tags that every webpage needs. First is the <html> tag, which lets the browser know that it should interpret the document as HTML. Next is the <head> tag, which contains the title of the webpage, links to stylesheets, and metadata to help search engines find the page. After the head tag is a <body> tag, which contains all the elements that will be presented on the screen. All the tags we talked about earlier, like <h1> and

<p> tags, appear inside the <body> tag. This is a simple website that has a title, two headings, and a few paragraphs. When we open it in a browser, we can see the heading and the two paragraphs. The title of the website shows up here in the tab. Everything is in its place, but it's not much to look at. That's where our next language, CSS, comes in.

CSS stands for Cascading Style Sheets and is used to make websites look good. HTML says what should appear, and CSS determines what it looks like. To showcase the power of CSS to style a website, let's look at a website with and without a stylesheet.

This is what the TestOut homepage looks like with HTML, but no CSS. The content is here – we can see the basic website structure and all the links, but it's super ugly. Now let's look at the website with HTML and CSS. This looks much better. The HTML is the same as before, but with CSS it's almost unrecognizable as the same page.

To see how CSS works, let's go back to our simple website. We won't do any dramatic changes like we saw with the TestOut website, but the basic principles are the same. First, we have to tell the HTML file where to find the CSS, which we do by adding a link tag inside the head. Then, we can add rules to the CSS file that adjust the style of the HTML. No matter how simple or complicated, all CSS rules share the same structure: They select part of the HTML, then use key value pairs to adjust the style for the selection. Let's look at some examples. First, we'll change the color of the headings to purple. We start by selecting all the <h1> tags. Then, inside these curly braces, we add a key value pair. The key is what we want the CSS to change, and the value is how we want it to change. Since we

want to turn the text purple, we'll choose the font-color key and set its value to purple. Now, when we refresh the webpage, we can see how this style has affected the look of the document.

Finally, let's talk about JavaScript, which makes webpages interactive. As an example, let's look at this simple to-do list application. Right now, this page has an HTML file to give it structure and a CSS file to give it a style. However, without JavaScript this page is static – it doesn't do anything. If we click these buttons or try to add a new item to the list, nothing happens.

Now let's add some JavaScript. This is what the code looks like. We won't talk about what this syntax means, but basically this page of code makes the webpage respond to input from the user. These comments show what each block of code does. This section will make the page cross out an item when it's clicked, this one makes the delete buttons work, this one lets the user add new items, and this one will show or hide the input field when the user clicks the plus icon.

Back in the webpage, we can see the JavaScript in action. If we type a new item and press enter, it's added to the bottom of the list. When we click an item, it gets crossed out, and when we click this garbage icon, the item is deleted. We can also toggle the input field by clicking the plus icon.

HTML is like the nouns of a website. It says what content should appear and determines its basic structure. CSS is like adjectives. It determines how the content from the HTML is presented. JavaScript is like verbs. It tells the website what to do and makes it interactive. Together, they can create good-looking, functional websites and applications.

8.5.3 HTML, CSS, and JavaScript Facts

Most websites, including this one, use three web design languages: Hypertext Markup Language (HTML), Cascading Style Sheet (CSS), and JavaScript. These languages are interpreted by the web browser to create the content you see on the screen. The following table briefly discusses each one.

Table 1: Web Browser Languages LANGUAGE

DESCRIPTION


HTML

HTML isn't a programming language, but a markup language. It is used to create the content and structure of a website. It specifies what should be displayed. It works by adding tags to text. The web browser interprets the tags to display the content we see on a webpage. Most tags have two parts, the opening tag that is surrounded by angle brackets (e.g.,

<html>), and the closing tag that has angle brackets and a forward slash (e.g., </html>). For example, in an HTML document, if we typed "<strong> "Hello World!"</strong>" and loaded it into a web browser, the browser would display Hello World! in bold letters. Common tags include the following:

• The <html> tag lets the browser know that it should interpret the document as HTML.


• The <head> tag contains the title of the webpage, links to stylesheets, and metadata to help search engines find the page.


• The <body> tag contains all the elements that will be presented on the screen.


• The <p> tag formats text as a paragraph.


• The <a> tag creates a hyperlink.


• The <h1> tag designates text as a first-level heading.


CSS

While you can use HTML to specify the style of text and images, it's cumbersome and inefficient. CSS gives websites their style (their look and feel). HTML specifies what should appear and CSS determines what it looks like. On most webpages, the table style, font, margins, and background are all generated by CSS.


JavaScript

JavaScript makes webpages interactive. JavaScript code tells the browser how to react to user inputs such as dragging the mouse. JavaScript tells the content from HTML and CSS what to do. As an example, consider the to-do list application below. It has an HTML file to give it structure and a CSS file to give it a style. However, without JavaScript the app is static; it doesn't do anything. If we click buttons or try to add a new item to the list, nothing happens. Adding JavaScript makes the webpage respond to input from the user such as deleting a task when you click the trash can, allowing users to add new items, and showing the input field when the user clicks the plus icon.

A simple to-do app created with JavaScript. Screenshot.


8.5.4 HTML Tags

HTML is a markup language. It works by taking a regular text document and using tags to designate parts of the text for different purposes. Generally, but not always, HTML tags have two parts—an opening tag (<tag>) and a closing tag (</tag>). This lesson is an overview of some of the most common HTML tags.

<html>

Most web pages, including the one you're looking at right now, are completely enclosed in <html> tags. This tag tells the browser that everything inside should be interpreted as HTML.

<head>

The <head> tag stores a web page's metadata, or information about the page. Metadata can include a title, subject, and keywords that relate to the page. The head can also hold links to other documents, such as stylesheets.

<body>

The <body> tag usually comes after the <head> tag. It contains the actual content of the web page. All the text, images, and links you see are part of the website's body.

<div>

The <div> tag is used to divide a website into different parts for different purposes. For example, one <div> may be used for a navigation bar, another for a side panel, and another for the site's main content. Using <div> tags this way makes it easier to organize and style each individual part of the page.

<p>

The <p> tag, or paragraph tag, is used to divide text into paragraphs. HTML Code

Output

<p>Paragraph 1</p>


8.5.5 Writing Simple HTML (Demo Video) Transcript:

In this video, we'll learn how to use the HTML drag-and-drop activities. On the right, we have a simple HTML webpage. If we click Execute, we can see how the page looks right now.

We can change the page by dragging these code options into the green rectangles. If we click Execute again, we can see how our changes affected the page. If you need a hint, you can click this debug button, then hover over the exclamation points.

You can also click the button at the bottom of the instructions to view what the web page should look like after the HTML code is set up correctly.

Feel free to experiment with different options and execute variations of the code to see what happens – you can always go back to the beginning by clicking Reset. When you're done experimenting and think you have the right answer, click Score.

8.5.6 HTML: Define a Webpage's Head and Body (Simulation) Scenario

In the next several labs, you will create a webpage for a recipe blog. Each lab will pick up roughly where the last one left off. To start, you’ll need to define your page’s <head> and <body>. The <head> is the part of the document that contains metadata, such as the website title, as well as links to other files. The <body> contains the actual content of the webpage. Right now, the <body> contains two paragraphs of text, each of which should be enclosed in <p> tags. To complete this lab:

• Add opening and closing tags for the <head>.


• Add opening and closing tags for the <body>.


• Add a closing tag to the first paragraph.


• Add an opening tag to the second paragraph.


Explanation

From top to bottom, the correct draggables are:

1. <head>


2. </head>


3. <body>


4. </p>


5. <p>


6. </body>


8.5.7 HTML: Add Headings to a Webpage (Simulation) Scenario

In this lab, you’ll add some structure to your webpage by creating headings. HTML headings come in six levels, from

<h1> to <h6>. For this page, you'll make the title at the top into an <h1> and the instructions heading into an <h2>. The

ingredients heading is already formatted as an <h2>. To complete this lab:

• Format Grandma Jacklin's Famous Biscuits as an <h1>.


• Format Instructions as an <h2>.


Explanation

From top to bottom, the correct draggables are:

1. <h1>


2. </h1>


3. <h2>


4. </h2>


8.5.8 HTML: Create Ordered and Unordered Lists (Simulation) Scenario

In this lab, you’ll create two lists – one for the ingredients and one for the instructions. HTML supports two types of lists: <ol> for ordered lists, where each item is given a number, and <ul> for unordered lists, where each item is given a generic bullet. With both types of lists, each list item should be enclosed in <li> tags. To complete this lab:

• Format the ingredients as a bulleted list


• Format the instructions as a numbered list.


Explanation

From top to bottom, the correct draggables are:

1. <ul>


2. </ul>


3. <ol>


4. </ol>


8.5.9 HTML: Add Images and Hyperlinks (Simulation) Scenario

In this lab, you’ll add a picture to the blog page. The picture should display immediately after the two intro paragraphs. Because the image has a Creative Commons license, you’ll need to give it a caption that attributes it to the photographer and links to the license page. In HTML, the <a> tag, which stands for "anchor," is used to define a hyperlink from one page to another.

To complete this lab:

• Add the biscuits.jpg image underneath the two paragraphs.


• Complete the three <a> tags.


Explanation

From top to bottom, the correct draggables are:

1. <img src="./images/biscuits.jpg>

2. a


3. href


4. </a>


8.5.10 HTML: Link a CSS File to an HTML Page (Simulation) Scenario

Now that all the page elements are in place, it’s time to start adding styles with CSS. We’ve created a CSS file for you that has styles for two elements. To view the CSS code, select the tab to the right of the HTML code. The first part of the CSS code specifies a linen background color for everything within the <body> tags, which means it affects the entire page. The next part specifies a margin for everything inside the <div> tags that have the .wrapper class attribute (highlighted in green). It also specifies that the background color of everything inside the wrapper should be white. To make these styles appear, you’ll need to tell the HTML document where to find the CSS document by using a <link> tag. To complete this lab:

• Add the CSS file to the href element of the <link> tag.


Explanation

Drag ./styles.css into the HTML document.

8.5.11 Writing Simple CSS (Demo Video) Transcript:

In this video, we'll learn how to use the CSS drag-and-drop activities. On the right, we have two tabs – One shows our HTML webpage and the other shows our CSS stylesheet. If we click Execute, we can see how the page looks right now. We can change the styles by dragging these code options into the green rectangles. If we click Execute again, we can see how the new style affects the look of the page. If you need a hint, you can click this debug button, then hover over the exclamation points.

You can also click the button at the bottom of the instructions to view what the web page should look like after you set up the styles correctly.

Feel free to experiment with different options and execute variations of the code to see what happens – you can always go back to the beginning by clicking Reset. When you're done experimenting and think you have the right answer, click Score.

8.5.12 CSS: Resize an Image (Simulation) Scenario

In this lab, you’ll add styles for the picture and its caption. Right now, the width of the picture doesn't match the width of the <div> that contains it. To fix this problem, add a style that resizes it to be the same width as the <div>. The caption is contained inside another <div> tag (highlighted in green in the HTML file). You’ll need to add a CSS selector to center the caption underneath the picture. This should not center any other text. To complete this lab:

• Make the width of the picture match the width of the wrapper <div>.


• Center the caption text underneath the picture without centering any other text.


Explanation

From top to bottom, the correct draggables are:

1. 100%


2. .caption


8.5.13 CSS: Change a Page's Fonts (Simulation) Scenario

In this lab, you’ll add styles to the page’s text. The title at the top of the page should be OrangeRed , the two

subheadings should be DeepSkyBlue , and all text on the page should be in Arial font. Additionally, some of the text is contained in <span> tags (highlighted in green in the HTML file). These tags are often used for styling specific text within a paragraph. For this page, you’ll add a style that italicizes text within <span> tags. To complete this lab:

• Italicize all text contained in <span> tags.


• Change the color of the top heading to OrangeRed .


• Change the color of the subheadings to DeepSkyBlue .


• Change all text in the document to Arial font.


Explanation

From top to bottom, the correct draggables are:

1. font-style (left)


2. italic (right)


3. h1


4. h2


5. body


8.5.14 CSS: Add a Drop Shadow to an Element (Simulation) Scenario

In this lab, you’ll put the finishing touches on the blog page by adding new styles to the wrapper <div> (highlighted in green in the HTML file). First, you’ll need to add 30 pixels of padding to the <div>. Padding adds some whitespace between the border of a container and its content, which makes the text more readable. Then, you’ll need to add a drop shadow, which will set the wrapper apart from the background. The drop shadow should be set 0 pixels to the right and 0 pixels down. In other words, it should be exactly centered behind the wrapper. It should also have 10 pixels of blur and a grey color. To complete this lab:

• Add a key-value pair to the CSS rule that adds 30 pixels of white space to the inside of the wrapper <div>.


• Add a value to the box-shadow key to make a grey drop shadow with 10 pixels of blur directly behind the wrapper

<div>.


Explanation

From top to bottom, the correct draggables are:

1. padding (left)


2. 30px (right)


3. 0px 0px 10px grey


8.5.15 JavaScript: Make a Webpage Interactive (Simulation) Scenario

In this lab you’ll explore how a JavaScript file can give functionality to an HTML page. When the code is set up correctly, it will change the background of the webpage to a random color whenever the button is clicked. To complete the lab, you’ll need to tell the JavaScript file which elements on the HTML page it needs to store as variables. In the HTML file, notice how the <body> and <button> tags both have id attributes, which is how the JavaScript file will

identify them. To complete the lab:

• Store the id attribute of the <button> tag in the button variable


• Store the id attribute of the <body> tag in the body variable


Explanation

From top to bottom, the correct draggables are:

1. "colorButton"


2. "body"


8.5.16 Section Quiz (Section Quiz) q_itf2_html_01

Which of the following BEST describes a front-end developer? Answers:

• *He or she is concerned with the aesthetics of a website.


• He or she services the website and manages user accounts.


• He or she may use Ruby, Java, PHP, and Python.


• He or she may use query languages like SQL.


Explanation:

Front-end development is concerned with the aesthetics of a website. The site should feel cohesive with a consistent color palette and sensible font choices.

Back-end development handles servicing the website and managing user accounts. He or she may use Ruby, Java, PHP, Python, and query languages like SQL.

q_itf2_html_02

Which of the following BEST describes a back-end developer? Answers:

• He or she uses HTML, CSS, and JavaScript to determine the way a website looks.


• *He or she accesses information from databases and prevents unauthorized access.


• He or she controls what you see visually in your web browser when you visit a site.


• He or she needs to make the website as user-friendly as possible.


Explanation:

Back-end developers access information from databases and prevent unauthorized access.

Front-end development has to do with things you see in your web browser when you visit a site.

One of the major focuses of front-end development is making the website as user-friendly as possible. Front-end developers use HTML, CSS, and JavaScript to determine the way a website looks and functions. q_itf2_html_03

Select the tags you MUST use to have a proper HTML document. (Select three.) Answers:

• *<html>


• <h1>

• *<head>


• <p>


• *<body>


• <a>


• <div>


Explanation:

To be a proper HTML document, there are a few tags that every web page needs. First is the <html> tag, next is the

<head> tag, and after the head tag is a <body> tag. q_itf2_html_04

What does JavaScript do?

Answers:

• Makes websites look good.


• *Makes web pages interactive.


• Links digital objects to each other.


• Contains the title of the web page.


Explanation:

JavaScript makes webpages interactive.

The HTML <head> tag contains the title of the web page.

Hypertext is a system that links digital objects to each other so that when you click the linking object, it can be viewed or pulled up.

CSS stands for Cascading Style Sheets. This language is used to make websites look aesthetic, colorful, and organized. q_itf2_html_05

Drag the correct HTML tag on the left to its description on the right. Answers:

• <html>


• <head>


• <body>


Explanation:

q_itf2_htmltags_01

You want to have a hyperlink to testout.com on your web page. What is the correct HTML syntax to accomplish this? Answers:

• <a href=www.testout.com>


• *<a href="www.testout.com">Link to the TestOut homepage</a>


• <a href=>Link to the TestOut.com homepage</a>


• <a href="www.testout.com"></a>

Explanation:

The proper formatting for the hyperlink is <a href="www.testout.com">Link to the TestOut homepage</a>. q_itf2_htmltags_02

Which of the following are the proper HTML tags used to create a numbered list? Answers:

• *<ol><li>Item 1</li><li>Item 2</li><li>Item 3</li></ol>


• <ol><a>Item 1</a><a>Item 2</a><a>Item 3</a></ol>


• <ol><i>Item 1</i><i>Item 2</i><i>Item 3</i></ol>


• <ol><ol>Item 1</ol><ol>Item 2</ol><ol>Item 3</ol></ol>


Explanation:

The following are the proper HTML tags used to create a numbered or ordered list:

<ol> <li>Item 1</li> <li>Item 2</li> <li>Item 3</li> </ol> q_itf2_htmltags_03

Question type needed for: DualListQuestion q_itf2_htmltags_04

How many heading tags are available for heading and subheading when using HTML? Answers:

• 2


• 4


• *6


• 8


Explanation:

There are 6 tags that are used to create headings and subheadings in an HTML document. The syntax for these tags is

<h1> through <h6>. q_itf2_htmltags_05

Which of the following tags contains all the elements that will be presented on the visual portion of a website? Answers:

• <p></p>


• <head></head>


• *<body></body>


• <div></div>


Explanation:

The <body> tag contains all the elements that will be presented on the visual portion of a website.

The <head> tag contains the title of the web page, links to stylesheets, and metadata to help search engines find the page. The <div> tag is used to divide a website into different parts that can be accessed separately for distinct coding purposes. The <p> tag, or paragraph tag, is used to create paragraphs of text.

8.6 Programming Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of computer programmers affect my daily life?


• How can I prepare for a career in programming?


This section describes common careers in computer programming. After finishing this section, you should be able to:

• Describe several careers in computer science, including application developer, web programmer, and QA engineer.


• Identify skills and educational requirements for computer science careers.


Key terms for this section include the following:

Term Definition


Application Developer

A person who creates applications for computers and mobile devices.


Web Developer

A person who creates websites and other technologies that are delivered through the internet.


QA Engineer

A person who makes sure the quality of a finished software application meets the standards of the company.


Database Programmer

A person who writes code to design, create, implement, and maintain databases.


8.6.1 Careers in Programming (Lesson Video) Transcript:

In this video, we're going to look at a few careers in computer programming. Since computers become more important with every passing year, programming and software development is a promising career path.

Application developers are one of the most common careers in programming. As you've probably guessed, their job is to create applications for computers and mobile devices. They usually work together in teams, and they create all kinds of software – word processors, games, database systems, graphics programs, web browsers, and much more.

Web developers create websites and other technologies that are delivered through the Internet. For example, the course you're using right now was created by a highly-qualified team of skilled web developers. There are three main types of web developer. Frontend developers use HTML, CSS, and JavaScript to create websites. Everything you see when you visit a website was made by a frontend developer. Backend developers do the behind-the-scenes coding that you don't see directly. Databases, user accounts, and security are all part of the backend. Full-stack developers do both frontend and backend work.

Any time a programmer writes code, there are bound to be a few bugs that pop up. Whenever these bugs make it to the end customer, it hurts the company. That's why companies hire quality assurance engineers, or QA engineers. These specialists monitor software development to make sure the quality of the finished product meets the standards of the company.

Some programmers specialize in a specific discipline within programming. For example, database programmers write code to design, create, implement, and maintain databases. Since databases store vital information that must be easily accessible and secure, database programmers are vital for most large companies.

Workers with programming skills are in high demand. If you've found this section of the course particularly interesting,

you may want to consider learning to program and becoming a developer.

8.6.2 Programming Career Facts

With computers becoming more and more a part of our everyday life, computer programming is a promising career for anyone who learns to write code. The table below describes a few careers related to computer programming.

Table 1: Computer Programming Careers TERM

DESCRIPTION


Application Developer

Application Developers are one of the most common careers in programming. Their job is to create applications for computers and mobile devices. They usually work together in teams, and they create all kinds of software: word processors, games, database systems, graphics programs, web browsers, and much more.


Web Developer

Web developers create websites and other technologies that are delivered through the Internet. For example, the course you're using right now was created by a highly-qualified team of skilled web developers. There are three main types of web development.

• Frontend developers use HTML, CSS, and JavaScript to create websites. Everything you see when you visit a website was made by a frontend developer.


• Backend developers do the behind-the-scenes coding that you don't see directly. Databases, user accounts, and security are all part of the backend.


• Full-stack developers do both frontend and backend work.


QA Engineer

Companies hire Quality Assurance or QA Engineers to make sure the quality of the finished product meets the standards of the company. Any time a programmer writes code, there are bound to be a few bugs that pop up. Whenever these bugs make it to the end customer, it hurts the company. QA specialists monitor software development in order to maintain a high quality product.


Database Programmer

Database programmers write code to design, create, implement, and maintain databases. Since databases store vital information that must be easily accessible and secure, database programmers are vital for most large companies.


8.6.3 Interview: Application Developer (Lesson Video) Transcript:

Uh, what's the biggest perk? Well, I love playing with technology. I really enjoy the challenge that comes from working through things and making them better.

I can just come in, I can get my job done, I can open my door when I need to talk to people, I can close my door and focus and still be super productive because at the end of the day what matters is what I created and wrote down that will permanently solve problems for other people.

We moved a lot I was a kid. We ended up moving into the first house my parents bought the last two weeks of sixth grade. And it was a whole new school district; the teacher didn't know what to do with me, so she sent me to the computer lab every day. That was the first time I'd actually got to be on a computer. And so for two weeks I was on a computer every day, and that kind of became pattern for the rest of my life at that point. I loved programming and working with computers and just got hooked and did it through middle school and high school.

The first time I got paid for programming was actually as a sophomore in high school. I had a DJ friend who wanted to get a list of all the songs – get a program to help him randomize his playlist. So that was in the high school computer lab during lunch. I wrote a program that you can put in all the songs, put in the types of music and organize and randomize it and so that was kind of fun. It was the first time I made money.

If you want to be a computer programmer, start now. There's tools available for free. You can learn how to program and figure out what's something you can do on a computer that you want to do - make a game, write a tool to make things easier for you, manage your recipes or track your exercise or diet or anything - just write a program to make it a little bit easier. And if that's satisfying to you then keep digging in. Find all the books and resources you can on learning languages and tools and how to improve yourself as a programmer and just go for it.

I love solving problems and every day I face different problems, and I'm solving different problems now than I was last week last year - totally different problems than I was working on 30 years ago. It's always changing and different. I really enjoy the challenge that comes from working through things and making them better.

8.6.4 Section Quiz (Section Quiz) q_itf2_programCareers_01

A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following?

Answers:

• *A full-stack web developer


• A quality assurance engineer


• An application developer


• A database programmer


Explanation:

There are three main types of web development:

• Front-end developers use HTML, CSS, and JavaScript to create websites. Everything you see when you visit a website was made by a front-end developer.


• Back-end developers do the behind-the-scenes coding that you don't see directly. Databases, user accounts, and security are all part of the back end.


• Full-stack developers do both front-end and back-end work.


Database programmers write code to design, create, implement, and maintain databases.

Companies hire quality assurance, or QA, engineers to make sure the quality of the finished product meets the standards of the company.

Application developers are one of the most common careers in programming. As the name suggests, they design applications for mobile or desktop environments.

q_itf2_programCareers_02

Which of the following job tasks would be something a QA specialist would do? Answers:

• Create applications for computers and mobile devices.


• *Monitor software development in order to maintain a high-quality product.


• Write code to design, create, implement, and maintain databases.


• Use Ruby, Java, PHP, Python, and query languages like SQL.

Explanation:

QA specialists monitor software development in order to maintain a high-quality product. Application developers create applications for computers and mobile devices.

Database programmers write code to design, create, implement, and maintain databases. Back-end developers use Ruby, Java, PHP, Python, and query languages like SQL. q_itf2_programCareers_03

In which of the following careers does one usually work together in teams to create software programs? Answers:

• *Application developer


• Web developer


• Quality assurance engineer


• Database programmer


Explanation:

Application developers are one of the most common careers in programming. They usually work together in teams to create all kinds of software programs.

Web developers create websites and other technologies that are delivered through the internet.

Companies hire quality assurance, or QA, engineers to make sure the quality of the finished product meets the standards of the company.

Database programmers write code to design, create, implement, and maintain databases. q_itf_programcareers_facts_01

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's

       . Answers:

• *Frontend


• Backend


• Full stack


• Protocols


Explanation:

The frontend of a website is the elements the end user can see in the browser. It is created with HTML, CSS, and sometimes JavaScript.

The backend of a website is the behind-the-scenes elements that make the website work.

Full stack refers to the frontend and backend together. Rather than describing websites, the term is generally used to describe developers who work on websites.

Protocols are rules that computers on a network must share and follow if they want to communicate with each other. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7. q_itf_programcareers_facts_02

Databases, authentication, and user accounts are all part of a website's          . Answers:

• *Backend


• Frontend


• Full stack

• Protocols


Explanation:

The backend of a website is the behind-the-scenes elements that make the website work. Databases and authentication are both backend technologies.

The frontend of a website is the elements the end user can see in the browser.

Full stack refers to the frontend and backend together. Rather than describing websites, the term is generally used to describe developers who work on websites.

Protocols are rules that computers on a network must share and follow if they want to communicate with each other. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.7.

9.0 Information Systems

9.1 Chapter Introduction


A man and a woman working along side each other. Illustration. Information Systems

This chapter describes the role of Information Systems in business. It introduces the importance of data analytics, business intelligence, systems analysis and design, project management, and protecting intellectual property. Students use Microsoft Excel and Access to perform simple data analysis. The chapter concludes with a brief look at common careers in Information Systems.

After finishing this chapter, you should be able to:

• Describe the various components of an information system.


• Describe the importance of Information Systems in transaction processing, supply chain management, and customer relationship management.


• Explain how businesses use data analytics to make more informed decisions.


• Use Microsoft Excel and Access to perform simple data analysis.


• Describe the importance of project management in the design and implementation of Information Systems.


• Describe how businesses protect their intellectual property.


• Identify common careers in Information Systems.


9.2 Introduction to Business Systems Section Introduction

As you study this section, keep the following questions in mind:

• How do I interact with information systems in my everyday life?


• How do information systems benefit businesses?


• When I buy something, how many people had to work together to make that transaction possible?


This section introduces you to the various components and types of information systems. After finishing this section, you should be able to:

• Describe the components of an information system and how they fit together.


• Compare and contrast different types of information systems, including transaction processing, management information systems, and expert systems.

• Describe the role of artificial intelligence in modern information systems.


• Explain how information systems can facilitate effective supply chain management.


• Identify the various systems that need to be integrated for customer relationship management.


• Describe how Bitcoin and other forms of cryptocurrency use distributed computing systems for financial transactions.


Key terms for this section include the following:

Term Definition


Information System

A combination of technology, people, and procedures used to organize, analyze, and store data.


Information System Types

The various forms of information systems including transaction processing, management, and expert systems.


Artificial Intelligence

An area of computer science that focuses on intelligent machines.


Supply Chain

The flow of goods and services from the producer to the consumer.


Customer Relationship Management (CRM)

Software that organizes notes, activities, and metrics into one working system that can help a business in many stages of the client-business relationship including client acquisition, client support, and client retention.


Cryptocurrency

A recent trend which is completely internet-based and uses cryptographical functions to conduct financial transactions.


Blockchain

A recordkeeping technology that was originally developed for Bitcoin. It consists of two parts: a piece of digital information and a public database. So, a blockchain is group of digital blocks of information that are stored in a public, decentralized database.


9.2.1 Introduction to Information Systems (Lesson Video) Transcript:

A system is a set of connected parts or procedures that lead to something being accomplished. For example, a car uses a steering system, an electrical system, and a braking system to travel to its destination. Similarly, an information system is a combination of technology, people, and procedures used to organize, analyze, and store data. These different parts of the system are used together to improve processes and increase an organization's value. In this video, we'll learn about the different components that make up an information system.

Let's first talk about technology. In an information system, technology can be broken down into three basic parts: hardware, software, and data. Hardware are the things that you can physically touch, like a computer, a keyboard, a storage device, or a tablet. However, these things are nothing without software. Software is the computer programs or set of instructions given to hardware telling it what to do. The third part under this group of technology is data, or a collection of facts. These can be numbers, words, pictures, or sounds. Data is also not touchable but through the hardware and software technologies we can gather data, index it, organize it, analyze it, and process it into meaningful

information. This information can, in turn, then be used to make important decisions, and those decisions can lead to improved processes and organization.

The next part of this information system are the people. Let's not forget that these technologies cannot work without the human resources and talent we can find in programmers, database administrators, system analysts, security specialists, and many more. These highly qualified people are an integral part of the success of an information system.

The last part are the procedures. A procedure is the sequence of steps or policies taken to reach an ultimate goal. One way to think about it is to say procedures are to people what software is to hardware. Procedures tell people what to do and how to react in certain situations.

Let´s use RMK Supplies, an online office supplies store, as an example of how an information system might work. System software can deliver live up-to-date data on the sales of pencils to the sales manager. This data is stored on a physical hard drive. The sales manager can use the necessary procedures to process this data to direct it to the warehouse, receive payments, and make a delivery. This is just one small example of how the parts of an information system work together to help a business.

In this video, we discussed the three different components that make up an information system. These are technology, people, and procedures. We learned how these different parts make up a system that allows for organizations to make better decisions, improve processes, and eventually increase its value.

9.2.2 Types of Information Systems (Lesson Video) Transcript:

Businesses use various information systems to help employees work more effectively, manage resources, and make informed decisions. In this video, we'll explore some of the most common types of information systems, including transaction processing, decision support, and expert systems.

Business transactions include things like airline reservations, bank withdrawals and deposits, credit card payments, and online purchases. A transaction processing system, or TPS, is designed to record, process, store, modify, and cancel these types of transactions.

A TPS typically integrates hardware and software technology that can facilitate transactions rapidly, maintain continuous availability, prevent data corruption, and allow users to cancel or correct transactional data. These systems need highly secure and scalable databases, as well as reliable backup procedures.

Some of the earliest transaction processing systems were created by IBM. IBM mainframe servers continue to be used for businesses that need to process high volumes of transactions. Other systems use specialized transaction servers within a distributed computing environment.

Management information systems provide businesses with the tools they need to organize, maintain, and evaluate company resources and other information. MIS tools include enterprise resource planning, or ERP, solutions, which integrate business operations and manage the flow of data between various departments.

Another MIS example is customer relationship management, or CRM, systems. These systems help organizations store and analyze relevant customer data, including tracking phone calls, retaining customers, and making the sales process more efficient.

Large organizations often maintain their intellectual property within a content management system, which makes it easier to manage and maintain digital resources, such as text, images, and other media files.

A decision support system, or DSS, is another specific type of management information system. While there is no substitute for human judgment in business decisions, a DSS can gather information and resources to help business leaders analyze markets, improve sales procedures, and expand their services. These systems provide statistical probabilities and data models that can support executives in predicting the results of different scenarios.

Expert systems go beyond decision support systems in providing more direct recommendations for business leaders. Artificial intelligence is used heavily in these systems, which are designed to solve complex problems in a specific domain. For example, expert systems have been developed to analyze the lubricating fluid used during oil drilling and to help doctors diagnose diseases. These systems are programmed as a complex web of conditional IF…THEN statements. A more recent AI technology built on neural networks is designed to closely mimic the physical connections of the human brain. Sometimes called deep learning, neural networks are better than traditional expert systems in accepting multiple inputs and recognizing patterns in raw data.

In this video, we introduced some of the most common types of information systems: transaction processing, management, decision support, and expert systems. We also discussed a few examples of enterprise solutions associated with each type.

9.2.3 Information System Facts

A system is a set of connected parts or procedures that lead to something being accomplished. For example, a car uses a

steering system, an electrical system, and a braking system to travel to its destination. Similarly, an information system is a combination of technology, people, and procedures used to organize, analyze, and store data. These different parts of the system are used together to improve processes and increase an organization's value. The table below describes these three main components in greater detail.

Table 1: Information System Components TERM

DESCRIPTION


Technology

In an information system, technology can be broken down into three basic parts: hardware, software, and data. Hardware includes the things that you can physically touch, like computers, keyboards, storage devices, or tablets. Software is the computer programs that provide instructions to hardware telling it what to do. Data are information that are collected and stored in a system. These can be numbers, words, pictures, or sounds.


People

Information systems can't work without the human resources and talent we can find in programmers, database administrators, system analysts, security specialists, and many more. People use the information system to analyze data and make sound decisions for the organization.


Procedures

A procedure is a sequence of steps or policies taken to reach an ultimate goal. One way to think about it is to say procedures are to people what software is to hardware. Procedures tell people what to do and how to react in certain situations.


Businesses use various information systems to help employees work more effectively, manage resources, and make informed decisions. The following table explores some of the most common types of information systems.

Table 2: Information System Types TYPE

DESCRIPTION


Transaction Processing

Business transactions include things like airline reservations, bank withdrawals and deposits, credit card payments, and online purchases. A transaction processing system, or TPS, is designed to record, process, store, modify, and cancel these types of transactions. A TPS typically integrates hardware and software technology that can facilitate transactions rapidly, maintain continuous availability, prevent data corruption, and allow users to cancel or correct transactional data. These systems need highly secure and scalable databases, as well as reliable backup procedures. Some of the earliest transaction processing systems were created by IBM. IBM mainframe servers continue to be used for businesses that need to process high volumes of transactions. Other systems use specialized transaction servers within a distributed computing environment.


Management

Management information systems provide businesses with the tools they need to organize, maintain, and evaluate company resources and other information. MIS tools include enterprise resource planning, or ERP, solutions, which integrate business operations and manage the flow of data between various departments. Another MIS example is a customer relationship management, or CRM, system. These systems help organizations store and analyze relevant customer data, including tracking phone calls, retaining customers, and making the sales process more efficient. Large organizations often maintain their intellectual property within a content management system, which makes it easier to manage and maintain digital resources, such as text, images, and other media files. A decision support system, or DSS,

is another specific type of management information system. While there is no substitute for human judgment in business decisions, a DSS can gather information and resources to help business leaders analyze markets, improve sales procedures, and expand their services. These systems provide statistical probabilities and data models that can support executives in predicting the results of different scenarios.


Expert Systems

Expert systems go beyond decision support systems in providing more direct recommendations for business leaders. Artificial intelligence is used heavily in these systems, which are designed to solve complex problems in a specific domain. For example, expert systems have been developed to analyze the lubricating fluid used during oil drilling and to help doctors diagnose diseases. These systems are programmed as a complex web of conditional IF…THEN statements. A more recent AI technology built on neural networks is designed to closely mimic the physical connections of the human brain. Sometimes called deep learning, neural networks are better than traditional expert systems in accepting multiple inputs and recognizing patterns in raw data.


9.2.4 Artificial Intelligence (Lesson Video) Transcript:

When most people hear the phrase artificial intelligence, they imagine futuristic computers with the ability to reason and respond just like humans. Some people worry about what's been called the technological singularity. This is a hypothetical point in the future when artificial intelligence will surpass human intelligence, triggering an explosion in technology advancement that could threaten the human race. In this video, we won't weigh in on whether machines could ever achieve superintelligence and take over the world. But we will talk about some advances in artificial intelligence that already have a tremendous impact on our lives.

Artificial intelligence is an area of computer science that focuses on intelligent machines. AI has already been implemented in various technologies ranging from computer games and simple voice recognition to advanced robotics and expert systems.

Of course there are still some important things that humans do better than computers. For example, humans are better at understanding and expressing emotion, producing creative artwork, and performing non-repetitive physical tasks. We're also better at certain forms of problem-solving that require synthesizing different sources of information and determining what's most important.

But there are other things that computers do better than we can.

Let's start with robotics, where self-driving cars and autonomous drones have the potential to be safer and more efficient than their human-operated counterparts. Artificial intelligence enters the picture when cars, drones, and other robots are programmed to learn from their mistakes without direct human intervention.

Another example is in natural language processing. This includes speech recognition and translation into different languages, such as English to Spanish. After converting speech into text, AI technology can be used to process the meaning of the text and carry on a basic conversation. Computer programs called chatbots can resolve common customer service concerns quickly and efficiently. Chatbots become more effective as they add new customer interactions to their knowledge base.

Artificial intelligence is used heavily in expert systems, which are programs designed to solve complex problems in a specific domain. For example, expert systems have been developed to analyze the lubricating fluid used during oil drilling and to help doctors diagnose diseases. These systems are programmed as a complex web of conditional IF… THEN statements.

A more recent AI technology built on neural networks is designed to closely mimic the physical connections of the human brain. Sometimes called deep learning, neural networks are better than traditional expert systems in accepting multiple inputs and recognizing patterns in raw data.

A final example of artificial intelligence is in Big Data Analytics. Data mining experts use AI in machine learning algorithms that discover patterns in vast amounts of data collected from Internet searches, social media posts, customer transactions, and weather sensors. These patterns can help businesses better understand their customers and help data scientists identify potential threats.

Artificial intelligence research has produced a wide range of technologies that significantly influence human lives. Robotics technology can be programmed to automate repetitive tasks and learn from mistakes in responding to sensory input. Natural language technologies can recognize human speech, engage in simple conversations and provide

rudimentary translation into other languages. Expert systems and neural networks help analysts make decisions based on complex scenarios. And data analysis algorithms enable computers to sift through unfathomable amounts of information to discover hidden patterns in human behavior.

9.2.5 Artificial Intelligence Facts

While some aspects of artificial intelligence will probably always be science fiction, real advances in AI have already had a tremendous impact on our lives. The table below describes key concepts associated with artificial intelligence. Table 1: Artificial Intelligence Concepts

Concept Description


Artificial Intelligence

An area of computer science that focuses on intelligent machines. AI has already been implemented in various technologies ranging from computer games and simple voice recognition to advanced robotics and expert systems.


Technological Singularity

A hypothetical point in the future when artificial intelligence will surpass human intelligence, triggering an explosion in technology advancement that could threaten the human race. Scientists disagree on whether the technological singularity could ever be achieved.


Robotics

The field of robotics includes self-driving cars and autonomous drones that have the potential to be safer and more efficient than their human-operated counterparts. Artificial intelligence enters the picture when cars, drones, and other robots are programmed to learn from their mistakes without direct human intervention.


Natural Language Processing

Natural language processing includes speech recognition and translation into different languages, such as English to Spanish. After converting speech into text, AI technology can be used to process the meaning of the text and carry on a basic conversation. Computer programs called chatbots can resolve common customer service concerns quickly and efficiently. Chatbots become more effective as they add new customer interactions to their knowledge base.


Gaming

Scientific research in artificial intelligence has been applied to video games since the mid-twentieth century. In the early years, AI development was focused on how to beat human players. More recently, AI has been applied to enhance players' gaming experiences. AI elements in gaming include complex machine learning systems and more believable visuals that capture natural human emotion.


Expert Systems

Artificial intelligence is used heavily in expert systems, which are programs designed to solve complex problems in a specific domain. For example, expert systems have been developed to analyze the lubricating fluid used during oil drilling and to help doctors diagnose diseases. These systems are programmed as a complex web of conditional IF...THEN statements.


Neural Networks

A more recent AI technology built on neural networks is designed to closely mimic the physical connections of the human brain. Sometimes called deep learning, neural networks are better than traditional expert systems in accepting multiple inputs and recognizing patterns in raw data.


Big Data Analytics

Data mining experts use AI in machine learning algorithms that discover patterns in vast amounts of data collected from Internet searches, social media posts, customer transactions, and weather sensors. These patterns can help businesses better understand their customers and help data scientists identify potential threats.

9.2.6 Supply Chain Management

Every business has a supply chain—a flow of goods and services from the producer to the consumer. Some of these supply chains are complex and others are quite simple. It's important to at least understand the present status of supply chain management, as the arrival of information systems has resulted in supply chain cycles that don't match the traditional cycles of the past.

Traditional Supply Chain Flow


Traditional supply chain flow. Illustration.

The traditional supply chain is a linear model that flows in a single direction, much like an assembly line. In the case of manufacturing, the process goes something like this:

1. Raw materials are sent to the manufacturer


2. The manufacturer creates the product


3. The product is shipped to a warehouse


4. The product is stored in a warehouse


5. The product is shipped to the stores in which it will be sold


6. The product is purchased by a customer


In a traditional supply chain, the main goals were increasing efficiency and reducing costs. While those goals are still considered, the modern supply chain is much more about putting the wants and needs of the customer first in order to build brand loyalty. Instead of being linear, it's more like a constantly shifting account of the consumer landscape.

Traditional supply chains were often fairly immobile. They ran the same way regardless of what else was going on. Modern supply chains must be agile, meaning that they're able to adapt to the ever-changing needs of the marketplace. Customers have more buying options than ever and expect more customization as well. Government regulations are constantly changing, too. The integration of information systems helps a supply chain obtain and maintain this kind of agility.

In many situations, the traditional model works just fine. But any company could soon find that the landscape requires them to adapt. For example, many consumers are switching to doing more online shopping through digital retailers like Amazon.com. This means that instead of having physical storefronts, all goods are kept in warehouses until someone orders them online. The retailer is expected to ship the goods directly to a consumer's business or home over a wide geographical (sometimes worldwide) area. To compete, many businesses are starting to offer more online options and integrating information systems into the process.

Influence of Information Systems


Influence of information systems in supply chain management. Illustration.

Information systems and technology can affect supply chain management in a variety of ways, including the following: Order Management

Orders can be created and tracked in a variety of ways with information systems, including in a physical location or over the phone or internet. Each order can be assigned a number, and the customer may be offered the chance to check on the order's status while it's in transit. Problems with an order can be easily referred back to the company, who can access all the pertinent information through the system. This leads to better communication with customers and a deeper sense of trust.

Inventory Databases

Information systems are an integral part of modern inventory management. Goods can now be given barcodes or other scannable symbols so that they can be entered into large inventory databases. When a customer purchases a product, the item is scanned and automatically deducted from the inventory. The system can automatically notify those in charge when a product is running low. Sometimes, the restocking process itself is automated so that new products are shipped as soon as they drop below a certain threshold.

Before this technology, inventory had to be taken by hand. The process took a lot more time and was prone to human

error.

Equipment Monitoring

Information systems can also help machinery run more efficiently. In a traditional supply chain, you would have to wait until a machine broke down before you fixed it. With current technologies, systems can predict when certain machines will need to be repaired and preventative measures can be taken. This means the entire operation will run more smoothly because these concerns are constantly monitored.

Predictive Analytics

Information systems are also used to predict trends in customer demand so that supply is created to better match these demands. This prevents overstocking of any given product and reduces warehouse storage space.

Automation

Information systems can automatically do many jobs that were once done by human employees. This frees up employees to help the business in more meaningful ways, such as providing leadership and interacting with customers.

9.2.7 Customer Relationship Management

When companies have hundreds or thousands of customers to work with on a daily basis, customer relationship management (CRM) software can help them keep everything flowing smoothly. CRM software can help a business in many stages of the client-business relationship, including client acquisition, client support, and client retention. Some companies have their own proprietary software that they use, while others use third-party solutions.

Integrating Systems

CRM software organizes notes, activities, and metrics into one working system. This allows different departments within a company (such as marketing, customer service, and management) to cooperate with each other. A company is able to create a customer-by-customer experience that's tailored to each customer's needs instead of adopting a one-size-fits-all approach.

There are many benefits to using CRM software, including the following:

• Increases your company's bottom line by increasing lead conversion, sales, customer satisfaction, and overall revenue


• Gets more referrals from existing customers


• Offers better support to your customers, which increases brand loyalty


• Increases insight into how your customers are thinking


• Automates systems so you get more utility from one instead of having to start from scratch


• Can be deployed completely from the internet, making it easier to access from anywhere


Uses of CRM Software


Uses of CRM software such as analysis, documentation, and customer loyalty. Illustrated diagram. Building Relationships with Customers

CRM software can be classified by the kinds of relationships it helps the company manage. Every piece of software has the same basic goal—to improve the business relationship with the customer. The following are some of the ways that CRM software is used:

Finding potential customers : some software can help you generate leads for people who might be interested in your product or service. It can create lists of people to call or email and help you keep track of those that've already been contacted.

Following up with current customers : some software solutions can help you monitor how long it's been since a customer has made a purchase and automatically follow up with those who have been away for a while. It can help you track a customer's spending habits so that you know what they're more likely to purchase in the future and tailor your offers to this.

Resolving problems with current customers : customers may encounter a wide variety of issues, including technical support issues or others that require customer service. CRM software can open digital tickets for a certain issue so that it can be documented and followed up on by different teams.

Analyzing data trends from current customers : CRM software can help you see what your customers are buying and

what they'll likely want in the future. This can help you plan how to better serve them in the future and maximize the company's profits.

There are many CRM solutions in use today. A few of them include:

• Salesforce (General CRM)


• HubSpot (Inbound CRM)


• Pipedrive (Sales CRM)


• Zoho CRM (Social CRM)


• Freshsales (Fully integrated CRM)


9.2.8 Cryptocurrency

Currency is anything that can be exchanged for goods and services. In our modern society, we typically use physical money for currency (bills and coins). Cryptocurrency is a more recent trend which is completely internet-based and uses cryptographical functions to conduct financial transactions. It operates using blockchain technology to make it decentralized, immutable, and transparent. This kind of currency has fluctuated greatly in value over the years, though. In others words, it can be a risky investment.

How Does Cryptocurrency Work?

The word cryptocurrency has two parts. The first part (crypto) refers to data encryption, and the second part (currency) refers to a medium of exchange. It functions like a form of virtual money that uses data encryption to ensure that transactions are secure. These currencies are completely digital, and they don't have physical counterparts like the dollar or euro.

Cryptocurrency is mostly used for online purchases. It can be transferred from one person's account to another just like regular money in a bank account. There are some places that even allow you to exchange your cryptocurrency for cash at an exchange rate.

One of the features of cryptocurrency is that it's decentralized. This means that it's not regulated by any kind of central authority. This cuts out the middleman and allows customers to transfer this kind of currency to each other securely and directly without having to pay fees to a bank.

Centralized vs. Distributed Ledgers


Centralized ledger: four banks pointing toward a clearing house which points to the centralized ledger. Distributed ledger: Four banks point to each other and each pointing to a separate ledger. Illustration.

Another appealing feature that these currencies have is anonymity. Even when paying with other digital systems, such as Venmo or PayPal, you have to set up an account that identifies who you are. With a cryptocurrency wallet, you don't have to disclose any personal information.

Common kinds of cryptocurrencies in use today include the following:

• Bitcoin


• Ethereum


• Ripple


• Litecoin


• EOS


• Cardano


• Stellar


• NEO

• Monero


• Zcash


Bitcoin is the most widespread cryptocurrency and among the most valuable. A single bitcoin can be worth several thousand dollars depending on the state of the market. Different cryptocurrencies have varying levels of privacy as well. Currencies like Dash and ZCash, for example, are much more difficult to trace than Bitcoin.

What Is a Blockchain?

Blockchain Technology


Blockchain technology flowchart. Illustration.

A blockchain is a kind of record-keeping technology that was originally developed exclusively for Bitcoin. It consists of two parts: a piece of digital information (the block) and a public database (the chain). So, a blockchain is a group of secure digital blocks of information that are stored in a public, decentralized database.

Each block stores information about a certain transaction, like the date, time, and dollar amount. It also stores information about who's participating in the transaction. It uses a secure digital signature to hide a person's true identity. Each block is distinguished from all other blocks by a unique identifier called a hash. This means that even if two people repeat the same transaction, you can tell each block apart by its hash identifier.

Typically, a single block in a Bitcoin blockchain can store up to 1MB of data. This means that one block can potentially store thousands of transactions. A new transaction has to occur for a new block to be added to a chain. The transaction must first be verified by a group of computers, stored in a block, and be assigned a hash.

A block becomes public once it's created within a blockchain and anyone can view the actual raw data. However, identities are masked by usernames. These chains are then distributed, which means that there's a copy of the blockchain on every network that uses it. This makes it hard for hackers to manipulate because there are so many copies of the information.

Blocks are always added to the end of the blockchain in the order they were created. Once a block is added to the end of the chain, it's very difficult to go back and change the data that's been stored. If you change anything about a block, the hash changes so you can see that the block has been tampered with. This grants an extra layer of security.

Pros and Cons of Cryptocurrency

Using cryptocurrencies has several advantages but also some disadvantages. Everything is more accurate as it's all verified by computers. It also eliminates third-party processing costs such as debit and credit card fees. Having a decentralized system makes it harder to be tampered with, while at the same time being more transparent, as the technology is open source. It also allows for constant access to funds and total anonymity, which is something many consumers are looking for in this day and age.

In terms of drawbacks, one issue is that there's a significant cost required to mine Bitcoin due to the massive processing power it takes. It can be difficult for people to understand and use properly. There are also no protections for people who lose their investments, as there are for physical currency in some jurisdictions. There's also no central repository for cryptocurrencies, which means that they can be wiped out by a computer crash if they aren't backed up. Privacy can be a drawback as well as it makes it easy for criminals to use for illegal activity and then mask their identity. Finally, the value of these currencies is based solely on supply and demand. There's a great deal of volatility, which means the value can fluctuate rapidly up and down since they're not based on any collateral like precious metals.

9.2.9 Section Quiz (Section Quiz) q_itf_is_01

Which type of Information System (IS) is used to help doctors diagnose diseases? Answers:

• Decision support system


• Customer relationship management


• Transaction processing system


• *Expert systems

Explanation:

Expert systems have been developed to analyze the lubricating fluid used during oil drilling and to help doctors diagnose diseases.

A decision support system can gather information and resources to help business leaders analyze markets, improve sales procedures, and expand their services.

Customer relationship management systems help organizations store and analyze relevant customer data. This includes tracking phone calls, retaining customers, and making the sales process more efficient.

A transaction processing system is designed to record, process, store, modify, and cancel customers' transactions. q_itf_is_facts_01

An information system is made up of which of the following general components? Answers:

• *Technology, people, and procedures


• Input, processing, and output


• Computers, smartphones, and radio waves


• Software, hardware, and firmware


Explanation:

An information system is a combination of technology, people, and procedures that are used to organize, analyze, and store data.

q_itf_is_facts_02

Which of the following is NOT an example of an information system? Answers:

• Transaction processing


• Customer relationship management


• Expert system


• *Electrical system


Explanation:

Transaction processing systems, CRM systems, and expert systems are all good examples of information systems. An electrical system would not be considered an information system because it does not combine technology, people, and procedures to organize, analyze, and store data.

q_itf2_cb_ai_01

Which of the following BEST describes expert systems? Answers:

• *They are programs designed to solve complex problems in specific domains.


• They use machine learning algorithms that discover patterns.


• They mimic the physical connections of the human brain.


• They are programmed to learn from their mistakes.


Explanation:

Artificial Intelligence (AI) is used heavily in expert systems, which are programs designed to solve complex problems in

a specific domain.

The field of robotics includes self-driving cars and autonomous drones that have the potential to be safer and more efficient than their human-operated counterparts.

Big data analysts and data mining experts use AI in machine learning algorithms to discover patterns in vast amounts of data collected from internet searches.

Neural networks is a more recent AI trend built on the idea of computer algorithms designed to closely mimic the physical connections of the human brain.

q_itf2_cb_ai_02

Which of the following Artificial Intelligence (AI) concepts includes self-driving cars? Answers:

• Expert systems


• Gaming


• *Robotics


• Neural networks


Explanation:

The field of robotics includes self-driving cars and autonomous drones that have the potential to be safer and more efficient than their human-operated counterparts.

In gaming, AI development is focused on how to compete against human players.

Artificial intelligence is used heavily in expert systems, which are programs designed to solve complex problems in a specific domain.

Neural networks is a more recent AI trend built on the idea of computer algorithms designed to closely mimic the physical connections of the human brain.

q_itf2_supplyChain_01

The flow of goods and services from the producer to the consumer is known as which of the following? Answers:

• *Supply chain


• Information System


• Order management


• Supply and demand


Explanation:

Every business has a supply chain, which is a flow of goods and services from the producer to the consumer. Some of these supply chains are complex and others are quite simple.

Information System (IS) technology can affect supply chain management in a variety of ways, including the following:

• Order management


• Inventory


• Equipment monitoring


• Supply and demand


• Automation

q_itf2_supplyChain_02

Which areas of Information System (IS) technology can lead to better communication with customers? (Select two.) Answers:

• *Order management


• Inventory


• Equipment monitoring


• Supply and demand


• *Automation


Explanation:

Order management leads to better communication with customers and a deeper sense of trust.

Automation frees up people to help out with the business in more meaningful ways, such as providing leadership and interacting with customers.

q_itf2_customerRelations_01

Which of the following BEST describes a customer relationship management (CRM) system? Answers:

• It is designed to record, process, store, modify, and cancel transactions.


• It is a computer program or set of instructions given to hardware telling it what to do.


• It is record-keeping technology that was originally developed for the Bitcoin cryptocurrency.


• *It organizes notes, activities, and metrics into one system that works altogether.


Explanation:

CRM software organizes notes, activities, and metrics into one system that works together. This allows different departments within a company (such as marketing, customer service, and management) to cooperate with each other. Software is the computer program or set of instructions given to hardware telling it what to do.

A transaction processing system is designed to record, process, store, modify, and cancel customers' transactions. Blockchain is record-keeping technology that was originally developed for the Bitcoin cryptocurrency. q_itf2_cryptocurrency_01

Which of the following is cryptocurrency? Answers:

• Venmo


• PayPal


• Cash App


• *Bitcoin


Explanation:

Bitcoin is the most widespread cryptocurrency and is among the most valuable.

Venmo, PayPal, and Cash App are generally used to transfer official currency to and from bank accounts. This could be for the purpose of purchasing something online or paying another person to whom you owe money. They are not cryptocurrency as they are all applications and deal mostly with government-backed forms of payment (dollars, euros, etc.).

q_itf2_cryptocurrency_02

Which of the following is both an advantage and disadvantage of using cryptocurrencies? Answers:

• *They allow for complete privacy.


• They are based solely on supply and demand.


• There is no central repository.


• They eliminate third-party processing costs.


Explanation:

Cryptocurrencies' privacy, which can be seen as a strength, can also be a drawback. This privacy makes it easy for criminals to use this kind of currency for illicit activities and mask their identities while doing so.

Being based solely on supply and demand and having no central repository are disadvantages of cryptocurrencies. The elimination of third-party processing costs is holistically an advantage of cryptocurrencies.

9.3 Data Analysis Section Introduction

As you study this section, keep the following questions in mind:

• Why do businesses need data to make decisions?


• How can spreadsheets make it easier to interpret data?


• How do charts make it easier to interpret data?


After finishing this section, you should be able to:

• Describe the importance of data-driven business decisions.


• Describe the relationship between data and information assets.


• Identify the basic steps in the data analytics process.


• Use Microsoft Excel tables and charts to analyze data. o Format cells as a table with total rows.


o Sort table columns to better interpret data.


o Use Excel charts to display aggregate data.


o Modify Excel chart settings to better interpret data.


• Analyze data using Microsoft Access reports. o Open an Access report based on a sales query.


o Interpret Access reports.


Key terms for this section include the following:

Term Definition


Data Analytics

The process of turning data points into useful information.


Microsoft Excel

Spreadsheet software created by Microsoft that helps organize and turn data into useful tables, charts, and graphs.


9.3.1 Data and Information Assets (Lesson Video) Transcript:

On the surface, data may seem like a collection of unimportant numbers – how long a person spent in a store, whether someone bought two items together, the ZIP code of a person who placed an online order, and so on. However, data like these are an extremely valuable asset for companies. In this video, we'll talk about how organizations can use data to better fulfill their missions.

Let's begin by talking about the business value of data and information assets. In addition to data about customers, manufacturing processes, and other research, businesses own intellectual property such as innovative product designs, software applications, educational material, and market analyses. To protect their valuable intellectual property, businesses often apply for trademarks and patents. They defend their rights to copyrighted material and they work hard to keep all of their information assets secure.

Now let's look at the relationship between data and information assets. The process of turning data points into useful information is called data analytics. The first step of the analytics process is to collect raw data. Let's use a grocery store as an example. They keep track of how many customers make purchases, what they're buying, how much they're spending, and what time they're shopping. If the customers use a loyalty card, the store can keep track of each individual shopper's buying habits over time.

Once raw data has been collected, analysts use statistical tools and formulas to look for trends, patterns, and correlations. For example, stores have found that customers who buy ice cream are more likely to buy bananas than customers who don't. This type of information is typically presented in a report to business executives.

The last step of the analytics process is to use the information generated by the analysis to inform meaningful decisions. Because customers who buy ice cream are likely to pick up bananas, many grocery stores keep a small display of bananas near the frozen foods.

Of course, encouraging customers to impulse-buy bananas is only one way companies use their data assets. By analyzing manufacturing processes, warehouse layouts, and delivery networks, companies can find ways to streamline production and use their resources more efficiently. Sales and marketing teams use data analysis to identify potential markets, monitor shifting demands, and create effective advertising.

In this video, we discussed the importance of data and information assets for businesses. We then looked at three steps of the data analytics process: collect data, apply statistical techniques, and use the information gained to help make decisions.

9.3.2 Data and Information Facts Data and Information

On the surface, data may seem like a collection of unimportant numbers - how long a person spent in a store, whether someone bought two items together, the ZIP code of a person who placed an online order, etc..

The table below summarizes how organizations can use data to better fulfill their missions. Table 1: Data and information assets

TERM DESCRIPTION


Data and Information

Businesses store data about customers, manufacturing processes, employees, etc. Businesses also own intellectual property such as innovative product designs, custom software applications, educational material, market analyses, etc.

Data and information is a valuable corporate asset.


Data analytics

The process of turning data points into useful information is called data analytics. The first step of the analytics process is to collect raw data. Let's use a grocery store as an example. The store keeps track of how many customers make purchases, what they're buying, how much they're spending, and what time they're shopping. If the customers use a loyalty card, the store can keep track of each individual shopper's buying habits over time. Once raw data has been collected, analysts use statistical tools and formulas to look for trends and patterns. This is called data correlation and this stage of analysis is considered the information layer. Machine learning systems and artificial intelligence (AI) are very helpful in the data correlation process. For example, statistical software tools found that grocery store customers who buy ice cream are more likely to buy bananas than customers who don't. This type of information is typically presented to business executives through meaningful reporting which can include search features, charts, and graphs.

The last step of the analytics process is to use the information generated by the analysis to inform meaningful decisions. Because customers who buy ice cream are likely to pick up bananas, many grocery stores keep a small display of bananas near the frozen foods.


Data-driven business decisions

Organizations use data analytics to make informed business operation decisions (data-driven business decisions). Of course, encouraging customers to impulse-buy bananas is only one way companies use their data assets. By analyzing manufacturing processes, warehouse layouts, and delivery networks, companies can find ways to streamline production and use their resources more efficiently. Sales and marketing teams use data analysis to identify potential markets, monitor shifting demands, and create effective advertising. As you consider how data can help in making good business decisions, consider the following.

• Capture and collection - Consider how data will be captured and collected. This could be from varying sources, such as web server log files or tracking systems used to gathered data with scanning sensors. Once captured, you must store the data. o Many businesses use relational databases for this purpose or other semi-structured data locations.


o Although semi-structured data does not reside in a relational database, the data have organizational properties that make analysis easier.


• Correlation - Establishing correlation in data enables an organization to make better business decisions. (This kind of correlation is often made using special tools that use machine learning and AI.) For example: o Did customers who bought blouses also buy skirts?


o Perhaps there is a correlation between the type of content on a website and how often someone bought the item being advertised (colors, layout, images, etc).


• Reporting - Captured data or correlations statics are helpful in making better business decisions only if it can be presented in a way that makes sense to those making the decisions. Consider: o One advantage of using databases, is the ability to query the data for specific information.


o Once gathered, it is important that the tools present the data in a way that can be easily interpreted, such as using graphs and charts.

Data Value

Data in any form is an extremely valuable to a company and is considered to be an asset. As such, great care should be taken to implement security controls to protect this asset.

There are many ways to implement security controls. Some may be fairly inexpensive, while other may be much more expensive. As you consider which security controls to use, it is wise to consider if the expense to implement the security controls is worth the cost.

This evaluation is known as determining the return on security investment (ROSI). It is created by doing a risk assessment. Although many of the security controls are covered elsewhere in the course, the following list outlines some examples of the type of security controls you can use to help protect the data.

• Use backups - A backup is a copy of data. In the event of a loss of data, or its corruption, the data can be retrieved from the backup.


• Use access controls - Access controls are used to protect who can see and change the data. This would include employees as well as competitors. Access controls are implemented in such was as: o Setting permissions - Permissions can be assigned to groups (as well as to individuals) and determine what the person accessing the data can do with the data.


o Using encryption - Encrypting data is a way to hide the data from those that don't have the proper keys to unencrypt the data. This is often used on local files as well as on files that are transferred over the internet.


o Creating firewalls - The term firewall, comes from the building industry where special walls were constructed to prevent the spread of a fire from one part of the building to the next. When it comes to


data, a firewall is a mechanism used to keep intruders from penetrating the environment and stealing or corrupting the data. Firewalls can be implemented using software and hardware.


• Create fault tolerance - As you consider the data you are striving to protect, remember that sometimes loosing even temporary access to your data, may cost your company a great deal of money. In these situation, you need to have high availability to your data. High availability (fault tolerance) refers to the ability of a system to continue operating without any noticeable delay when one or more of its components fail. Some examples of fault tolerance include: data redundancy, network redundancy, site redundancy, and power redundancy.


Data-driven Business Decisions

By using data analytics to inform business operations, organizations make data-driven business decisions. By analyzing manufacturing processes, warehouse layouts, and delivery networks, companies can find ways to streamline production and use their resources more efficiently. Sales and marketing teams can use data analysis to identify potential markets, monitor shifting demands, and create effective advertising.

9.3.3 Microsoft Excel Chart Types (Lesson Video) Transcript:

Excel has a huge amount of chart options--basically any chart option you'll ever need. While this means you can nearly always make the kind of chart you want, it can also make it difficult to know which kind of chart is the best for your data. In this video, we're going to discuss some best practices for choosing the correct kind of chart.

This sheet shows the results of a recent kart race. At the top we have the name of each racer, and underneath we have the time in seconds that it took them to finish the race. For this information we have five categories, the racers, and each category is independent of all of the others. For example, if we didn't know any of the other times we'd still know that

Bob finished the race in 50 seconds. This is a perfect case for a bar graph. This is a bar graph of the data; it's easy to see which kart racers had the shortest and longest times.

This sheet contains acceleration data for two racing karts. On the left we have the time in seconds that the karts have been traveling, and the numbers show how fast each kart was traveling at each second. Because this information is measuring change over time and we have even time intervals, we should use a line graph for this data. Using a line graph, we can immediately see that the Mushroom Car has better acceleration but a lower top speed than the Dragon Car. This final set of data shows the total number of races won by each racer in a recent tournament. We'd like to graphically represent the percentage of races won by each contestant. Because we're interested in viewing relative percentages and all of our data adds up to 100%, we can use a pie chart. This chart makes it obvious that Louis won the most races and Bob won the fewest. Keep in mind that pie charts are hard to understand when they have too many categories.

Let's recap. When our data is divided into distinct categories that are independent of each other, a Bar Graph is a great option. When we want to measure change over time and our data has even time intervals, a line graph works well.

Finally, when we have categorical data and we want to see the proportions of each part to the whole, we may consider using a pie chart. Using the right chart for your data will make it easier for you and others to understand your data.

9.3.4 Use Microsoft Excel Tables to Analyze Data (Demo Video) Transcript:

In this lab, you have an Excel spreadsheet with data on the average life expectancy for people in the Americas. To make this data easier to understand, we can format it as a table. First, we'll select the data. A good way to do this is to select cell A3, then scroll down to the bottom. Holding shift, click cell D43. With the data selected, go to the top of the screen and click Format as Table. From here, you can choose any of these preconfigured designs. Click OK.

Not only do tables help the data look nice, they also give it some new functionality. For example, we can use these arrows to sort our data. Let's sort it by overall life expectancy from highest to lowest. We can also add a row of summary information to the bottom of the table. With a cell in the table selected, go to the Design tab, then check Total Row. This adds a new row to the bottom of the table. Right now, it's showing the sum of all these numbers – not super helpful.

Instead, let's change these numbers to show the average of each column.

With the table data sorted with a total row, we have all the information we need to answer the questions in the lab.

9.3.5 Use Microsoft Excel Tables to Analyze Data (Simulation) Scenario

The purpose of this lab is to walk you through some simple data analysis using a Microsoft Excel table. In this scenario, you want to analyze the life expectancy of various countries in the Americas. To more easily interpret and analyze the data, perform the following tasks:

1. Format cells A3:D43 as a table with headers.


2. Add a total row to the table, then adjust the total row to show the average life expectancy for each column.


3. Use the second column of data to sort the table from longest to shortest overall life expectancy.


Examine the data in the table. Then answer the following questions:

• The country with the longest overall life expectancy is      .


• The country with the shortest overall life expectancy is        .


• In the Americas, how many more years does the average female live than the average male?


Explanation

In this lab, you will analyze data in a Microsoft Excel data table. You will then answer several questions:

• The country with the longest overall life expectancy is      .


• The country with the shortest overall life expectancy is        .


• In the Americas, how many more years does the average female live than the average male?

Complete this lab as follows:

• Format cells A3:D43 as a table with headers. a. Select cells A3 through D43 by clicking and dragging over the cells.


b. On the Insert tab, in the Tables group, click Table .


c. Click OK .


• Add a total row to the table, showing average life expectancy numbers for each column. a. Select a cell in the table.


b. On the Table Tools Design tab, in the Table Style Options group, select Total Row .


c. Select B44. Click the arrow button that appears and choose Average .


d. Repeat step three for C44 and D44.


• Sort the table from longest to shortest overall life expectancy. a. Click the dropdown arrow next to the Overall Life Expectancy header in B3.


b. Select Sort Largest to Smallest .


• Analyze the data to determine which country has the longest overall life expectancy: a. Make sure the rows in the table are sorted from longest to shortest overall life expectancy.


b. Notice the country at the top of the table.


c. Answer Question 1.


• Determine which country has the shortest overall life expectancy: a. Make sure the rows in the table are sorted from longest to shortest overall life expectancy.


b. Notice the country at the bottom of the table.


c. Answer Question 2.


a. Make sure the table includes a total row showing the average life expectancy number for each column.


b. Subtract the value in cell D44 from the value in cell C44.


c. Answer Question 3.

• Use the table to calculate how many more years the average female lives than the average male:


9.3.6 Use Microsoft Excel Charts to Analyze Data (Demo Video) Transcript:

In this lab, we have a spreadsheet with the gold medal times for the Olympic Women's 100 Meter Run. To better see how these results have improved over time, we'll make a line chart based on this data. First, we'll select the data we want to see in the chart, including the column headings. Then, on the Insert tab, click Insert Line Chart, then select the Line option from the gallery. To move this chart to its own worksheet, select the chart, then on the Design tab click Move Chart. We'll move it to a new sheet called Time Progression. Next, we'll add labels to the chart. Click this plus, then check the Data Labels box.

With the chart all set up, we have all the information we need to answer the questions in the lab.

9.3.7 Use Microsoft Excel Charts to Analyze Data (Simulation) Scenario

The purpose of this lab is to walk you through some simple data analysis using a Microsoft Excel chart. In this scenario, you want to analyze the progression in winning times in the women's 100 meter run at the Olympics since 1928. To more easily interpret and analyze the data, perform the following tasks:

1. Insert a new line chart based on the data in A2:B23.


2. Move the chart to a new chart worksheet called Time Progression .


3. Enable the Data Labels option on the chart.


Examine the data table on the Gold Medal Winners sheet, along with the chart on the Time Progression sheet. Then answer the following questions:

• The current Olympic record in the women's 100 meters was set in      .


• The current Olympic record holder is        .


• How many times has an existing Olympic record been tied by a winner of the race in subsequent years?


Explanation

In this lab, you will analyze data in a Microsoft Excel table and chart. You will then answer several questions:

• The current Olympic record in the women's 100 meters was set in      .


• The current Olympic record holder is        .


• How many times has an existing Olympic record been tied by a winner of the race in subsequent years?


Complete this lab as follows:

• Insert a new line chart based on the data in A2:B23. a. Select cells A2 through B23 by clicking and dragging over the cells.


b. On the Insert tab, in the Charts group, click Insert Line Chart and choose Line from the dropdown.

• Move the chart to a new worksheet called Time Progression . a. Click the chart to select it.


b. On the Design tab, in the Location group, select Move Chart .


c. Select the New sheet option, change the name of the new sheet to Time Progression , and click OK .


• Enable the Data Labels option on the chart. a. Near the bottom of the workbook, select the Time Progression sheet.


b. Click the chart to select it.


c. Near the top-right corner of the chart, open the Chart Elements options (green plus button).


d. Select Data Labels checkbox to enable the option.


• Analyze the data to determine when the current Olympic record was set: a. On the Time Progression sheet, notice the line's minimum value (where it extends down to its lowest point).


b. On the Gold Medal Winners sheet, refer back to the data table to verify the year of the current Olympic record.


c. Answer Question 1.


• Determine who is the current Olympic record holder: a. On the Gold Medal Winners sheet, find the current Olympic record and then note the winner of the race.


b. Answer Question 2.


• Determine how many times an existing Olympic record has been tied in subsequent years: a. On the Time Progression sheet, begin at the far left of the line chart and note each time a new Olympic record was set.


b. Move to the right on the line chart and count each time an existing record was tied.


c. Answer Question 3.


9.3.8 Use Microsoft Access Reports to Analyze Data (Demo Video) Transcript:

In this lab, we'll look at reports in Access. A report is a formatted, easy-to-read summary of the information in a table or query. This database has three reports, which you can see down here. To open a report, double-click it. You can scroll up and down to view the report's contents. To close a report, click this x.

The reports here provide all the information you need to answer the questions in the lab.

9.3.9 Use Microsoft Access Reports to Analyze Data (Simulation) Scenario

The purpose of this lab is to walk you through some simple data analysis using a Microsoft Access report. In this scenario, you are using an Access database to keep track of sales data.

Open the Total Sales by Product report. Then answer the following questions:

• The restaurant made      from selling drinks.


• The restaurant sold        Double Mapleton Burgers.


• The restaurant sold a grand total of        items.


Explanation

In this lab, you will analyze data presented in a simple Microsoft Access report. You will then answer several questions:

• The restaurant made      from selling drinks.


• The restaurant sold        Double Mapleton Burgers.


• The restaurant sold a grand total of        items.


Complete this lab as follows:

1. View the Total Sales by Product report and determine how much money was made from selling drinks: a. In the left pane, double-click the Total Sales by Product report.


b. In the Drink section of the report, notice the total price of the six drinks that were sold.


c. Answer Question 1.


2. Determine how many Double Mapleton Burgers were sold: a. In the Burger section of the report, notice the Number Sold in the Double Mapleton Burger row.


b. Answer Question 2.


3. Determine how many total items were sold: a. In the Grand Total section of the report, notice the total Number Sold.


b. Answer Question 3.


9.3.10 Section Quiz (Section Quiz) q_itf2_data_01

Which of the following describes the process of turning data points into useful information? Answers:

• *Data analytics

• Raw data collection


• Market analysis


• Data-driven business decisions


Explanation:

Data analytics is the process of turning data points into useful information. Raw data collection is the process of gathering data prior to analysis.

Market analysis is performed by marketing teams to identify potential markets.

Data-driven business decisions are decisions made by an organization that use data analytics to inform business operations.

q_itf2_data_02

Which of the following describes using data analytics to inform business operations? Answers:

• *Data-driven business decisions


• Raw data analysis


• Market analysis


• Research analysis


Explanation:

Data-driven business decisions are decisions made by an organization that use data analytics to inform business operations, such as finding ways to streamline production and use resources more efficiently.

Raw data collection is the process of gathering data prior to analysis.

Market analysis is performed by marketing teams to identify potential markets. Research analysis uses data and information to develop products and services. q_itf2_data_03

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations? Answers:

• *Statistical tools and formulas


• Data-driven business decisions


• Data points


• Databases


Explanation:

Analysts use statistical tools and formulas to look for trends, patterns, and correlations. For example, stores have found that customers who buy ice cream are more likely to buy bananas than customers who don't. This type of information is typically presented in a report to business executives.

Data-driven business decisions are decisions made by an organization that use data analytics to inform business operations.

Data points are used by data analytics to turn data into useful information. Databases are used to store data and information.

q_itf2_data_04

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Answers:

• *Bar graph


• Pie chart


• Line graph


• Excel table


Explanation:

Bar graphs work well for displaying data that has distinct categories and independent measurements. Pie charts work well for viewing data that has relative percentages and adds up to 100%.

Line graphs work well for viewing information that changes over time and has time intervals. An Excel table or range is typically used to hold data that is to be represented graphically. q_itf2_data_05

When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?

Answers:

• *Pie chart


• Bar graph


• Excel table


• Line graph


Explanation:

Pie charts work well for viewing data that has relative percentages and adds up to 100%.

Bar graphs work well for displaying data that has distinct categories and independent measurements. An Excel table or range is typically used to hold data that is to be represented graphically.

Line graphs work well for viewing information that changes over time and has time intervals. q_itf2_data_06

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

Answers:

• *Line graph


• Bar chart


• Pie chart


• Excel table


Explanation:

Line graphs work well for viewing information that changes over time and has time intervals.

Bar graphs work well for displaying data that has distinct categories and independent measurements. Pie charts work well for viewing data that has relative percentages and adds up to 100%.

An Excel table or range is typically used to hold data that is to be represented graphically. q_itf2_data_07

Which of the following are features of using an Excel table to store data? (Select two.) Answers:

• *Column sorting


• *Total row


• Graphing


• Data correlation


• Range


Explanation:

Excel tables provide multiple advantages over using a simple range of data. Column sorting and the ability to add rows are two helpful ones.

Graphing, data correlation, and range are not features of a table. A range can be converted into a table to make more features available.

q_itf2_data_08

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Answers:

• *Reports


• Forms


• Tables


• Queries


Explanation:

Microsoft Access provides the ability to generate reports from the data in a database that can then be analyzed. Forms, tables, and queries are other key features of Microsoft Access. However, they do not provide the data analysis that reports can offer.

q_itf2_data_09

What is the first step of the data analytics process? Answers:

• *Collecting raw data


• Using statistical tools to analyze data


• Generating information


• Creating a data report


Explanation:

The first step of the analytics process is to collect raw data.

Next, analysts use statistical tools and formulas to look for trends, patterns, and correlations. This information is presented in data reports.

The last step of the analytics process is to use the information generated by the analysis to inform meaningful decisions. q_itf2_data_capture

Sharon works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers.

Which of the following is the first step Sharon needs to perform in the analysis process?

Answers:

• Store the data.


• Correlate the data.


• *Capture the data.


• Report the data.


Explanation:

The first step in the data analytics process is to consider how your data will be captured. This could be from varying sources, such as tracking systems like those used gathered data by scanning sensors, or perhaps by the information found in log files use by web server.

Data is stored after it is captured. Many businesses use relational databases for this purpose or other semi-structured data locations.

Data is correlated after it is captured and stored. You can often make better business decisions by seeing if there is any correlation between the data collected.

Data results are reported to the company after all the analysis work has been done, including capturing, storing, and correlating the data.

q_itf2_data_correlation

Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers.

Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products.

Which of the following describes this step of the analytics process? Answers:

• Product design


• Risk assessment


• *Data correlation


• Data query


Explanation:

With your data captured, you can sometimes make better business decisions by seeing if there is any correlation between the data collected. For examples, did customers who bought blouses also buy a skirt?

Product design is the process of imagining and creating products that solve problems or address specific needs for customers. Product design is not part of the data analytics process.

A risk assessment is a process of identifying hazards and risk factors. It is not part of the data analytics process.

Data queries are used with relational databases to pull specific information out of a database and are not a fundamental step in the data analytics process. However, you can query a database for information that might be valuable in completing a data analytics step (such as correlating data).

q_itf2_data_reporting

Mary is a data analyst for a large pharmaceutical company. The company wants to know how their new organic line of over-the-counter cold relief medications is being perceived by customers and what they can do to better promote the product.

Mary has collected a significant amount of raw data and has analyzed it to find connections and links between the data points. The insights are significant, and now she needs to inform company management.

What is Mary's next step in the data analytics process? Answers:

• Present the insights to company management in a conference call.

• *Provide meaningful reporting with a system that includes search features, charts, and graphs.


• Share the raw data and insights with company management in an official report.


• Prepare a PowerPoint presentation to inform company management.


Explanation:

Meaningful reporting is the final step in the data analytics process. It presents data for people to analyze and interpret. The system content can include features such as search and query tools, charts, graphs, and tables.

While presenting the insights in a conference call (or other setting) can be useful, meaningful reporting is the final step in the data analytics process.

While collecting the raw data and insights into a report might be useful to the data analysts, this type of information is difficult for non-analysts (such as company management) to interpret.

Although a slideshow presentation could be useful for initially presenting the insights and raw data, the final step in the data analytics is to make sure that the results can be accessed in meaningful ways through a more sophistocated reporting system.

q_itf2_data_security

Which of the following are security controls you can use to help protect the data on your network? (Select three.) Answers:

• *Backups


• Reporting


• Analytics


• *Access controls


• Natural language processing


• Transaction processing


• *Fault tolerance


Explanation:

A backup is a copy of your data and a security control to help protect network data. In the event of data loss or corruption, the data can be retrieved from the backup.

Access controls are used to protect who can see and change your data and are a type of security control. This would include employees as well as competitors.

Fault tolerance is the high availability of data and is a type of security control. Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating even when one or more of its components fail without any noticeable delay.

Reporting is a way of presenting captured data or statistics that makes the data understandable to individuals making business decisions. It is not a security control that protects data.

Analytics is the process of turning data points into useful information by collecting raw data. looking for trends and patterns, and then using the information to help individuals make meaningful decisions. It is not a security control that protects data.

Natural language processing includes speech recognition and translation into different languages. It is not a security control that protects data.

Transaction processing includes items such as airline reservations, bank withdrawals and deposits, and online purchases. It is not a security control that protects data.

q_itf2_data_statistical

The first step in data analytics is to collect raw data and summarize the information. What is the next step in data

analytics?

Answers:

• The business applies for a trademark or patent to protect the data information.


• *The analysts use statistical tools and formulas to look for trends, patterns, and data correlations.


• The business makes data-driven decisions based on the data information.


• The analysts create reports that help them make informed business decisions.


Explanation:

Once raw data has been collected, analysts use statistical tools and formulas to look for trends, patterns, and data correlations.

Although businesses can apply for trademarks or patents to protect their market analyses, this is not a step in the data analytics process.

By using data analytics to inform business operations, organizations make data-driven business decisions. However, this only occurs after the data analytics process is complete.

While data analysts often create reports, the reports are not the second step in the data analytics process. q_itf_data_information_facts_01

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

Answers:

• *Data and information


• Trademarks


• Servers


• Facilities


Explanation:

The most important assets for a small business are the data and information used to run their business. If data is lost, such as a customer or order database, the business is at great risk of failing.

Trademarks are important, but not critical, assets.

Since servers and facilities can be replaced, they are less important than data or business information.

9.4 Designing and Implementing Systems Section Introduction

As you study this section, keep the following questions in mind:

• What are the benefits of an iterative development process?


• How does project management help in the creation of information systems?


• What are the benefits of the Agile methodology?


After finishing this section, you should be able to:

• Identify the traditional stages of the System Development Life Cycle (SDLC).


• Describe modern alternatives to a linear process of systems analysis and design.


• Describe the role of project management in the design and implementation of information systems.

• Identify the core principles of Agile methodology in project management.


Key terms for this section include the following:

Term Definition


Systems Analysis and Design

The study and design of a system, accomplished by examining its components and their interactions.


System Development Life Cycle (SDLC)

A methodology or framework that defines steps and tasks for developing and maintaining information systems.


Waterfall Model

A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.


Iterative Design

A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.


Planning Phase

The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.


Analysis Phase

The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.


Design Phase

The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.


Implementation Phase

The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.


Maintenance Phase

The SDLC phase that involves monitoring and evaluating the new information system.


Project Management

The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.


Systems Integration

An activity that involves integrating various computing systems and software applications to function together as a whole.


Agile

A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.

Needs Assessment

A systematic process for determining and addressing needs, or "gaps" between current conditions and desired conditions, or "wants".


Risk Management

The identification, evaluation, and prioritization of risks followed by activities that minimize, monitor, and control the impact of the risk.


9.4.1 Systems Analysis and Design (Lesson Video) Transcript:

An information system has three main components: technology, people, and procedures. These components don't come together as an efficient, secure system without careful planning and design. In this video, we'll provide an overview of information systems analysis and design. This work requires understanding the technology needs of an organization as well as potential security threats.

To design and implement an effective and secure information system, systems analysts work closely with end-users, software engineers, systems administrators, and managers of the organization. As an organization evolves and its needs change, the information system needs to be updated and expanded.

The methodology used by systems analysts is called the System Development Life Cycle, or SDLC. Since software applications are typically central to an organization's system, SDLC can also stand for Software Development Life Cycle. Traditionally, the SDLC is divided into a series of phases, from preliminary analysis and design to implementation and maintenance. These phases are often viewed as a linear progression. Today, most information systems are developed using an iterative process that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design. For example, rather than redesigning the entire system at once, an organization might start by implementing a single enterprise application, such as new sales and marketing software. This process continues until the entire system is in place.

While many different variations of the SDLC exist, we'll discuss five of the most commonly defined phases: planning, analysis, design, implementation, and maintenance.

The planning phase involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project. In this phase, the organization decides who will supervise the project and who will be part of the design and development team. The final planning document details the goals of the information system in responding to new business opportunities and making operations more efficient.

In the analysis phase, the project team takes a close look at any existing information systems that are already in place. For example, if the organization currently uses a transaction processing system to track customer orders, the team will determine if this system is adequate or needs to be upgraded. Does the organization need a better support system to help business leaders make more informed decisions? Do product developers have the processes and tools they need to work efficiently? The requirements for the new information system will bridge the gap between the existing system and the goals of the new one.

The design phase takes the system requirements document from the analysis phase and produces detailed specifications that cover all aspects of the system. These specifications account for security risks and include computer system requirements, network configuration, cloud hosting services, database design, and application software solutions. In some cases, the design phase might include a series of prototypes that can be tested by potential users of the new system. In the implementation phase, developers and administrators purchase and install new hardware and software, integrate the various system components, and test the operation of the new system. For example, developers would need to ensure that a new ecommerce application operates seamlessly with an organization's existing inventory control and distribution systems. After the system is thoroughly tested, employees may need to receive training. Before retiring the old system, the project team might decide to keep it running in parallel with the new system for a while. Another way of easing the transition to a new system is to implement it with a small pilot group first.

Finally, in the maintenance phase, the new system needs to be monitored and evaluated. When the project team identifies problems, they might need to cycle back to the earlier planning and analysis phases to improve the system. For example, if a data breach is discovered, the organization must determine the cause of the breach and implement a plan to avoid

future vulnerabilities.

In this video, we've provided a high-level view of information systems analysis and design. We focused on five phases of the System Development Life Cycle, or SDLC: planning, analysis, design, implementation, and maintenance. Most systems analysts use an iterative approach in cycling through the phases for smaller subsets of the system until it's entirely functional and secure.

9.4.2 Systems Analysis Facts

An efficient, secure information system requires careful planning and design. The systems analysis and design process typically involves end-users, software engineers, systems administrators, and managers of an organization. The table below describes key concepts associated with information systems analysis and design.

Table 1: Systems Analysis and Design CONCEPT

DESCRIPTION


System Development Life Cycle

The methodology used by systems analysts is called the System Development Life Cycle, or SDLC. Since software applications are typically central to an organization's system, SDLC can also stand for Software Development Life Cycle. Traditionally, the SDLC is divided into a series of phases, from preliminary analysis and design to implementation and maintenance.


Waterfall Model

Historically, the waterfall model has been the most widely used development model. It divides the SDLC into a series of sequential or linear phases, from preliminary analysis and design to implementation and maintenance.


Iterative Design

Today, most information systems are developed using an iterative process that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design. For example, rather than redesigning the entire system at once, an organization might start by implementing a single enterprise application, such as new sales and marketing software. This process continues until the entire system is in place. The Agile method is one of the most popular iterative models, especially in the software development industry.


Planning Phase

The planning phase involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project. In this phase, the organization decides who will supervise the project and who will be part of the design and development team. The final planning document details the goals of the information system in responding to new business opportunities and making operations more efficient.


Analysis Phase

In the analysis phase, the project team takes a close look at any existing information systems that are already in place. For example, if the organization currently uses a transaction processing system to track customer orders, the team will determine if this system is adequate or needs to be upgraded. Does the organization need a better support system to help business leaders make more informed decisions? Do product developers have the processes and tools they need to work efficiently? The requirements for the new information system will bridge the gap between the existing system and the goals of the new one.


Design Phase

The design phase takes the system requirements document from the analysis phase and produces detailed specifications that cover all aspects of the system. These specifications account for security risks and include computer system requirements, network configuration, cloud hosting services, database design, and application software solutions. In some cases, the design phase might include a series of prototypes that can be tested by potential users of the new system.


Implementation Phase

In the implementation phase, developers and administrators purchase and install new hardware and software, integrate the various system components, and test the operation of the new system. For example, developers would need to ensure that a new ecommerce application operates seamlessly with an organization's existing inventory control and distribution systems. After the system is thoroughly tested, employees may need to receive training. Before retiring the old system, the project team might decide to keep it running in parallel with the new system for a while. Another way of easing the transition to a new system is to implement it with a small pilot group first.


Maintenance Phase

In the maintenance phase, the new system needs to be monitored and evaluated. When the project team identifies problems, they might need to cycle back to the earlier planning and analysis phases to improve the system. For example, if a data breach is discovered, the organization must determine the cause of the breach and implement a plan to avoid future vulnerabilities.


9.4.3 Project Management Facts

IT professionals are responsible for designing, updating, and maintaining information systems. This work often requires that they fulfill a project management role. In large organizations, the scope of design and maintenance projects can span across multiple departments with various systems that need to be integrated with each other. Complex IT projects like these require skilled project managers who stay current with rapidly changing technology solutions. The table below describes key activities associated with IT project management.

Table 1: IT Project Management ACTIVITY

DESCRIPTION


Systems Integration

One of the biggest challenges for IT project managers is to integrate various computing systems and software applications so they can function together as a whole. Technology changes need to be coordinated within the enterprise network, which includes data centers and storage facilities, virtual and remote assets, and wireless and wired access controls. Organizations that have not fully integrated different subsystems are often much less efficient and secure.


Agile Methodologies

Because IT projects are often large and complex, it usually makes sense to divide them into smaller, more manageable projects that can be completed as part of an incremental or iterative process. The Agile method is the most popular model used today. A project that follows this methodology is called a scrum , which is broken up and prioritized into functional sprints . A sprint includes product features than can be released one at a time or together with several other sprints. Agile development teams typically meet daily to review progress and coordinate the efforts of team members. After each sprint, scrum teams hold a retrospective meeting to adapt to changing requirements and adjust project goals.


Needs Assessment

Before beginning a project, managers need to perform a thorough needs assessment. This includes who will be using the new computer system or software, which subsystems need to be integrated with proposed changes, and when the project needs to be completed.


Communicating with Stakeholders

Project managers know the importance of communicating with everyone who will be impacted by a technology change. Project stakeholders include managers and executives who authorize funds as well as staff members who will be responsible for supporting the systems after they've been implemented. Since most projects encounter unexpected challenges, such as the loss of key team members or platform incompatibilities, project managers need to maintain open communication with stakeholders throughout the project life cycle.

Risk Management

Organizations typically make technology changes to improve business operations. However, most changes also come with possible risks. An important part of IT project management is identifying and managing these risks. For example, allocating additional funding to a project may strain another project's budget. Adding a new member to a team may negatively impact the team's effectiveness as training the new member will cause


stress and consume time. Skilled project managers embrace risks they believe are worth taking and then implement a plan for mitigating them. Many risks can be avoided by making sure project requirements are clear and comprehensive before moving forward on the project.


Controlling Costs

Completing a project within the approved budget is often the most important indicator of project success. Cost control involves accurate cost forecasting, detailed record-keeping, and regular budget reviews. Cost management software can be used to ensure projects stay within budget.


Meeting Project Deadlines

The first and most obvious step to meeting project deadlines is to include accurate time estimates during the planning phase. Deadlines that are based on reasonable task duration estimates need to be communicated clearly to team members. Project managers are responsible for helping development teams track their progress, improve performance, and request additional resources as needed. Resource management software such as Trello, Jira, and Workfront can help teams divide up big projects into smaller, manageable tasks. These tasks can be assigned to individuals along with due dates and any other pertinent information to get the task done.


Project Evaluation and Assessment

Good project managers learn from both their successes and failures. They gather relevant data throughout the project life cycle to determine where things went wrong and how the development process can be improved. They actively seek input from team members both during and after the completion of the project.


9.4.4 Agile Methodology Agile Development


Agile development cycle.

There are many different ways that software or other products can be developed, and Agile methodology is one of them. Agile isn't a program or application; it's a process that has proven effective for many development teams. It consists of tight-knit teams that work together between the business side and the development side of a project. Agile development promotes constant inspection, reflection, and adaptation. This mindset uses several specialized terms that refer to different roles that people on the team take on.

Agile Terminology Scrum Diagram


Scrum diagram.

Iterative Development

One of the first terms that's good to know is iterative development. An iteration is a cycle that's repeated over and over. When developing a product, the hope is that each iteration will make the product better through team collaboration.

Scrum

Another term that's often used with the Agile development process is Scrum. Scrum is an Agile framework, which in this context is just a certain collection of practices that must be consistently followed. The goal of using Scrum is to keep the overhead for the process as low as possible in order to maximize development time.

Scrum Master

During the Scrum process, each day starts with a meeting that's led by the project manager, who's known as the Scrum

Master. It's the Scrum Master's job to schedule meetings, run them, and make sure that everyone is being as productive as possible. During a Scrum meeting, people usually report on what they've already accomplished and what they plan on doing that day.

Sprints

The Scrum process is built around Sprints. A Sprint is a time period where the Scrum team works together on a specific goal. These can as short (a week) or long (up to several weeks) depending on the nature of the goal. A general rule is that the more complex the task, the shorter the sprint should be so that the team can collaborate more often. That way they can keep errors from getting out of control

In a Scrum process there are three artifacts, or things that are created. These are the Product Backlog, the Sprint Backlog, and the Increment.

Product Backlog

The Product Backlog is a central list of work that needs to be done. It's a dynamic list that constantly changes to include new features, enhancements, and bug fixes that need to take priority.

Sprint Backlog

The Sprint Backlog is a list of things from the Product Backlog that have been prioritized to be worked on in the next Sprint Cycle . The team meets together before a Sprint starts and decides what belongs on the list.

Increment

The Increment is also known as the Sprint Goal . This is the finalized end product that should be completed by the end of the Sprint.

Product Owner

The Product Owner is the person on an Agile team who gets to decide what goes on the Sprint Backlog and when a task is sufficiently complete. He or she facilitates the quality control of the product to make sure the team is meeting the goals they set out to accomplish.

Agile Development Benefits

This development process has become popular because it provides many benefits to both developers and customers. Customers enjoy a developer who can respond easily to their requests, and developers enjoy the lower overhead. Teams like the fact of having less busywork to do, and workers often feel more valued because they're working on things that they're most effective at doing.

9.4.5 Section Quiz (Section Quiz) q_itf_sdlc_sys_analysis_facts_01

Which of the following is a methodology used by systems analysts? Answers:

• *System Development Life Cycle (SDLC)


• Assess, Design, Develop, Implement, Evaluate (ADDIE)


• Business Process Management (BPM)


• Total Quality Management (TQM)


Explanation:

Systems analysts generally follow the system development life cycle, or SDLC. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.8. q_itf_sdlc_sys_analysis_facts_02

Which of the following terms is most often used to describe a sequential or linear process of systems analysis and design?

Answers:

• *Waterfall


• Iterative


• Agile

• Real-world


Explanation:

The waterfall method, in contrast with an iterative approach, is where systems are developed in a strict sequence. Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.8. q_itf_sdlc_sys_analysis_facts_03

Which of the following is NOT one of the essential components of an information system? Answers:

• *Hyperlinks


• Technology


• People


• Procedures


Explanation:

Information systems are made of people, technology, and procedures. Hyperlinks are clickable text that link documents together on the web.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 2.8. q_itf_pm_facts_01

What is the main purpose of agile methodologies? Answers:

• *To divide large IT projects into smaller, more manageable projects as part of an iterative process


• To incorporate artificial intelligence into the IT design and development process


• To control the costs of IT projects


• To make sure the entire IT project follows a series of sequential phases, from preliminary analysis to implementation


Explanation:

The main purpose of agile methodologies is to divide large and complex IT projects into smaller, more manageable projects that can be completed as part of an incremental or iterative process.

Artificial intelligence is not typically part of agile methods. While agile methods might decrease the costs of IT projects, that is not their main purpose. Agile methods are often contrasted with the waterfall model, which follows a series of sequential or linear phases, from preliminary analysis and design to implementation and maintenance. q_itf_pm_facts_02

Which of the following is NOT an element of effective cost control in IT project management? Answers:

• Cost forecasting


• Detailed record-keeping


• Regular budget reviews


• *Waterfall methods

Effective cost control involves accurate cost forecasting, detailed record-keeping, and regular budget reviews. Waterfall methods relate to systems analysis and design and are typically not associated with cost control.

q_itf_pm_facts_03

Rita is a network administrator at a small office supplies company. She has been asked to design and implement a major upgrade of the company's network infrastructure. Which of the following activities will best help Rita to successfully manage this project? (Choose TWO.)

Answers:

• *Make sure the project requirements are clear and comprehensive


• *Perform a thorough needs assessment for the company


• Eliminate every possible risk before proceeding with the project


• Organize the project into a series of linear or sequential phases


Explanation:

Successful IT projects require clear and comprehensive requirements, including a thorough needs assessment.

While risk management is an essential project management activity, eliminating all risk is impossible. Risks can be mitigated through effective planning, communication, and experience. Rather than organizing IT projects into a series of linear phases, it usually makes sense to divide them into smaller, more manageable projects that can be completed as part of an incremental or iterative process.

q_itf2_agilemethods_01

Which of the following terms is used to describe a cycle or version that is repeated over and over? Answers:

• *Iterative


• Waterfall


• Agile


• SDLC


Explanation:

An iteration is a cycle or version of something that is often repeated over and over. When developing something, the hope is that each iteration makes the product better. The product or project evolves over time through the collaboration of various team members.

The waterfall method, in contrast with an iterative approach, is where systems are developed in a strict sequence.

The Agile methodology of development consists of tightly-knit teams that work together between the business side and the development side of a given project.

The methodology used by systems analysts is called the system development life cycle (SDLC). q_itf2_agilemethods_02

Which of the following terms is used to describe a lightweight development process with very little overhead? Answers:

• Waterfall


• Iterative


• *Scrum


• SDLC

Scrum is a process framework, which means that it is a certain collection of practices that must be consistently followed. It is also considered to be lightweight because the goal is to keep the overhead for the process as low as possible.

The waterfall method, in contrast with an iterative approach, is where systems are developed in a strict sequence. An iteration is a cycle or version of something that is often repeated over and over. When developing something, the hope is that each iteration makes the product better.

The methodology used by systems analysts is called the system development life cycle (SDLC). q_itf2_agilemethods_03

Which of the following Scrum artifacts is a central list of work that needs to be done? Answers:

• Sprint backlog


• *Product backlog


• Sprint goal


• Project evaluation


Explanation:

The product backlog is a central list of work that needs to be done. It is a dynamic list that changes constantly to include new features, requirements, enhancements, and bug fixes that help the team decide what they need to work on.

The sprint backlog is a list of things from the product backlog that have been prioritized to be worked on in the next sprint cycle.

The sprint goal is the usable end product that is supposed to be completed by the end of the sprint.

Project evaluation occurs at the conclusion of the project. The project manager gathers relevant data throughout the project life cycle to determine where things went wrong and how the development process can be improved. q_itf2_agilemethods_04

What is the person called on an Agile team who gets to decide what goes on the sprint backlog and whether a task is done or not?

Answers:

• Manager


• Team leader


• Marathon runner


• *Product owner


Explanation:

The product owner is the person on an Agile team who gets to decide what goes on the sprint backlog and whether or not a task is done. He or she facilitates the quality control of the product to make sure the team is meeting the goals they set out to accomplish.

None of the other terms describe this person on an Agile team.

9.5 Intellectual Property Section Introduction

As you study this section, keep the following questions in mind:

• How do intellectual property laws help me? How do they help companies?


• Why should I obey intellectual property laws?


• What can I do to help improve intellectual property legislation in my country?

After finishing this section, you should be able to:

• Describe the implications of copyright and intellectual property laws for internet use.


• Explain how Creative Commons licenses can make it easier for content creators to share their work.


• Explain how the Digital Millennium Copyright Act (DMCA) can potentially protect both copyright owners and ISPs.


Key terms for this section include the following:

Term Definition


Copyright

Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives of, sell, rent, or lend a work.


Intellectual Property

Anything that is owned by a copyright holder.


Piracy

The crime of using someone else's intellectual property in a way that should be reserved for the copyright holder.


Fair Use

An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.


Public Domain

Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.


Proprietary Software

Any software where the publisher retains intellectual property rights to the source code.


Open-source Software

Software where anyone can inspect, enhance, and modify the source code.


Patent

A license given by a government that provides inventors a temporary monopoly on their invention.


Trademark

Any word, picture, or symbol that's used to distinguish a good from other similar goods.


Privacy Expectation

A reasonable belief that personal information collected by an information system is controlled and protected, not shared or used beyond its original intent.


Creative Commons

A non-profit organization that gives content creators free licenses that allow them to share their work in exactly the way they want to.


Digital Millennium Copyright Act (DMCA)

A law that was created to protect artists of all types (musical, visual, literary, etc.) from having their work pirated through technology.


9.5.1 Copyright and Intellectual Property (Lesson Video) Transcript:

If you create something, such as a painting, book, or photograph, it belongs to you. As its creator, you have certain rights, such as the right to sell or display your work. These rights are collectively referred to as copyright. In this video, we'll briefly discuss copyright and talk about how it is relevant to your use of the Internet. Each country has its own copyright laws, but in this video will talk about copyright in the United States.

The United States constitution gives Congress the power "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." In other words, they can create rules for protecting the right of creators to make a profit from their creations. This is done in part by copyright. Whenever a person or company creates something new, they automatically have certain rights regarding their work. These protections include the right to reproduce (or copy) the work, display the work publicly, make derivative works based on the original, and distribute copies to the public by sale, rental, or lending. If someone violates your copyright, such as by selling your work as their own, you can take them to court and force them to pay you back.

Next, let's look at copyright as it applies to social media. Suppose you've written a poem. Since the poem is your original work, you own the copyright for it. That means you're free to distribute it however you see fit. If you post your poem to a social media platform like Facebook, you still own the copyright – it's still your poem. However, as part of creating your Facebook account, you agreed to allow Facebook to use your posts in whatever way they wish. Even though the poem still belongs to you, Facebook now has permission to use and distribute it, even without your knowledge. So, if you want to sell or publish your poem, you should not share it on Facebook. If you just want to show it to your friends for free, share away.

As important as it is for you to be mindful of your own copyrights, it's just as important to respect the copyrights of others. Movies, TV shows, music, and books can all be copyrighted and are the property of their owners. If you use copyrighted material to make money without permission, or if you make copies of copyrighted material without permission, it's called piracy. Piracy can be punished by heavy fines and even jail time. Yarr! However, there is an exception called fair use. Fair use means that short excerpts of a copyrighted work can be presented or quoted for purposes that benefit the public, such as criticism, teaching, research, and news reporting. Movie critics who use short clips from a film as part of their review are an example of fair use. Remember, though, that fair use is not a right – it's just a legally defensible position.

The videos in this course often use stock photography. These photographs are the intellectual property of a company called Getty Images. Since we're using their property to create this course, which we're selling for money, we had to purchase a license from Getty Images. A license grants the person or company that has it permission to use or distribute a copyrighted work in ways that would otherwise be a copyright infringement. Which means, if we didn't have a license to show these images, it would be piracy.

In the United States, works created by the federal government are not entitled to copyright. These works are all free for anybody to use. So, we can show you these beautiful pictures taken by NASA without having to pay for a license.

Another source of free media we can use is called the public domain. All copyrights eventually expire. When they do, the work stops being the property of the copyright holder and falls into the public domain, which means that anyone can use it for any purpose without having to pay a fee. Which means, we can show you this montage of Buster Keaton stunts for free because they're part of the public domain.

Finally, let's talk about two kinds of software. Most computer programs you buy are proprietary software, which means the company that created it maintains exclusive control of the source code and won't let others use it without buying permission. Microsoft Office applications like Word and Excel are examples of proprietary software. Open-source programs allow anyone to inspect, modify, or enhance them without needing to pay or ask for permission. Examples of open source software are Audacity, Gimp, and Linux.

We've just taken a short look at Intellectual Property in the United States. Copyright protects the ability of creators to profit from their creations. We discussed copyright in the context of social media. We briefly looked at fair use, licenses, and the public domain. We also compared proprietary software to open source software.

9.5.2 Patents and Trademarks (Lesson Video)

Transcript:

In this video, we'll look at two ways that intellectual property can be legally protected: patents and trademarks. These laws vary widely from country to country. Because TestOut is an American company, this video will focus specifically on patents and trademarks in the United States.

A patent is a license given by a government that provides inventors a temporary monopoly on their invention. Patent holders are allowed to prevent other people from making, selling, or using their patented invention for a certain amount of time. In exchange, the patent holder has to provide the public with clear and detailed disclosure of how their invention works. The patent system encourages innovation by guaranteeing the rights of inventors to make money off of their inventions for a few years, while at the same time making the details of the inventions public, which can inspire further innovation.

To get a patent, an inventor must submit an application to the federal patent office, where it's reviewed by a panel of relevant experts and judges.

Next, let's talk about trademarks. A trademark is any word, picture, or symbol that's used to distinguish a good from other similar goods. Unlike copyright and patents, which are intended to protect creators, trademarks exist to protect consumers – they make it easy for people to know who makes their products and help each brand establish a standard of quality that consumers can expect.

There are a huge variety of symbols that can serve as trademarks. These include words, like TestOut; phrases, like Just Do It; logos, like this window or this apple; illustrations, like the Gerber baby; colors, like Cadbury purple or

Fiskars orange; even sounds like this one [Darth Vader noise]. Basically, anything that distinguishes one brand from another can be used as a trademark.

You've probably seen these two symbols used to designate a trademark. The TM simply means the company is asserting that it has a trademark. The R in a circle means the trademark has been formally registered with the US Patent and Trademark office.

Because trademarks exist to help consumers know what products they're buying, trying to mislead customers by pretending to be another brand is called trademark infringement. For example, let's say you want to buy a can of Dr Pepper. When you get to the soda aisle, you'll likely encounter a few off-brand sodas, like Dr. Lightning, Dr. J, or Dr. Salt. These are all fine because their names are different enough that it's easy to distinguish them from the original.

However, if a soda company tried to trick customers by using a similar name like Dr. Popper or Peppo, they could be sued for trademark infringement.

In this video, we learned about two mechanisms for protecting intellectual property: patents and trademarks.

9.5.3 Intellectual Property Facts

The United States Constitution gives Congress the power "to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries" (Article 1 Section 8).

The idea of protecting rights to ideas and discoveries is called copyright. Two other ways that intellectual property can be legally protected are through patents and trademarks. While intellectual property laws vary widely from country to country, this lesson focuses on these rights in the United States.

The table below discusses ideas related to copyright and intellectual property. Table 1: Copyright and Intellectual Property

TERM DESCRIPTION


Copyright

Protections granted by the federal government to creators, writers, and inventors. Copyright includes the rights to reproduce, display, make derivatives, sell, rent, or lend a work. Copyright is automatically given to creators of works; no application is necessary. Copyrights usually have a time limitation that they are enforceable. For example, in the United State, 14 years was the default, but could sometimes be extended. Other countries have varying lengths.


Intellectual property

Anything that is owned by a copyright holder is called intellectual property. Some common examples of intellectual property are books, paintings, songs, poems, movies, and inventions.


Piracy

Piracy is the crime of using somebody else's intellectual property in a way that should be reserved for the copyright holder. This can include downloading a movie without paying, making photocopies of a book, or selling a copy of a CD. Piracy is punishable by jail time and fines.


Fair use

Fair use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. Such uses include criticism, teaching, research, and news reporting. However, it should be noted that fair use is not a right; it's a legally defensible position.


Public domain

Works whose copyrights have expired enter the public domain. Public domain works are free for anyone to reproduce, display, and make derivatives.


Proprietary software

Any software the publisher retains intellectual property rights to the source code. Most software you buy is proprietary. Generally, the end user has the right to use the software but does not have the right to make and distribute unauthorized copies.


Open-source software

Software anyone can inspect, enhance, and modify the source code. Open-source software is often free and often has several optional third-party add-ons to enhance the product. Common open-source software examples are GIMP and the Linux operating system.


Patent

A license given by a government that provides inventors a temporary monopoly or protection on an invention. For example, patent holders can prevent other people from making, selling, or using their patented invention for a certain amount of time. In exchange, the patent holder must provide the public with clear and detailed disclosure of how the invention works. The patent system encourages innovation by guaranteeing the rights of inventors to make money from their inventions for a few years. At the same time, making the details of an invention public can inspire further innovation. To get a patent, an inventor must submit (or register) an application to the federal patent office. The application is reviewed by a panel of relevant experts and judges. An inventor should also register a patent with other countries for further protection.


Trademark

A trademark is any word, picture, or symbol that's used to distinguish a good from other similar goods. An example is the name of a company or the logo used by a company. Unlike copyright and patents, which are intended to protect creators, trademarks exist to protect consumers. Trademarks make it easy for people to know who makes a product.

Trademarks can also help each brand establish a standard of quality that consumers can expect. There are a wide variety of symbols that can serve as trademarks. These include words, phrases, logos, illustrations, colors, and even sounds.

Anything that distinguishes one brand from another can be used as a trademark. There are two symbols used to designate a trademark. The TM simply means the company is asserting that it has a trademark. The R in a circle means the trademark has been formally registered with the US Patent and Trademark office. Trademark infringement is the act of trying to mislead customers by pretending to be another brand. Take Dr. Pepper for example. When you get to the soda aisle, you'll likely encounter a few off-brand sodas, like Dr. Lightning, Dr. J, or Dr. Salt. These are all fine because it's easy to distinguish them from the original. However, if a soda company used a similar name like Dr. Popper, the company could be sued for trademark infringement.


Digital goods

Digital goods, also known as digital products, are intangible products that exist only in a digital form. This means the product is available to customers only as binary computer data, such as e-books in PDF format, Wikipedia articles, music, and Netflix videos. Since the content is in a digital form, it is easier to steal and copy. To help protect your

company against illegal use of digital products, you can use access control technologies to restrict the use of your digital data. These types of controls are known as digital rights management (DRM) or technological protection measures (TPM). DRM and TPM help you control the use, modification, and distribution of your copyrighted digital data. As part of these features, companies often try to force users to pay for the use of their digital products. Technologies used to help protect digital data include such things as, using product keys, limited installation activation, encryption, anti- tampering, etc.


9.5.4 Creative Commons

Whenever you draw a picture, write a story, or take a photograph, your work is automatically protected by copyright. Since you own the work, it can only be reproduced and distributed with your permission. This is great if you want to sell your work for a profit. But what if you want to share it for free? That's the role of Creative Commons. Creative Commons a non-profit organization that gives content creators free licenses that allow them share their work in exactly the way they want to. Creative Commons licenses have a variety of options that users can choose from to customize the way their work is shared.

License Examples

Table 1: Creative Commons Rights Right

Symbol Description


Attribution


A person in a circle with the letters BY beneath.

Anyone who uses the licensed work must give credit to the original creator. All Creative Commons licenses must include the Attribution right.


No Derivative Works


Equals sign in a circle with the letters ND beneath.

Other people may copy or distribute the original work, but they may not make changes to it. Only verbatim copies of the work are allowed.


Share Alike


A looped arrow in a circle with the letters SA beneath.

Anyone who uses the work must distribute it under a license that's identical to the original. Since we don't want to distribute this course for free, we can't use any resources that include the Share Alike right.


Non-Commercial


A dollar sign crossed out in a circle with the letters NC beneath.

Only the copyright holder is permitted to make money from the work. For example, you could make a t-shirt with a design that has this right, but you could not sell it.


A Creative Commons license consists of one or more rights from the table above. All licenses have the Attribution right. The other three can be added depending on how much freedom the copyright holder wants to grant to others. The following chart shows several common CC licenses grouped by the amount of freedom they give to end users.

Creative Commons Licenses

Continuum showing the varying levels of freedom with certain licenses. Attribution Example

The following is provided as an example of how to properly attribute an online media resource, such as a picture or video, with a Creative Commons license.


A squirrel eating out of its hands.

"Squirrel" by Phil Fiddyment is licensed under CC BY 2.0 This citation is ideal because it contains:

1. The title of the work with a link to the original source


2. The name of the author with a link to their profile page


3. The type of license with a link to the license deed


9.5.5 Digital Millennium Copyright Act

In this age of digital media, copyright laws are more important than ever. It's easier than ever to share media over the internet, and artists must be sure to secure intellectual protection for their works or face losing income to digital piracy. In order to address some of the issues raised by antiquated copyrights laws in modern times, Congress passed the Digital Millennium Copyright Act (DMCA) in 1998. The law didn't go into effect until the year 2000, however, and has been a source of controversy ever since.

DMCA Logo


DMCA logo.

What Is the DMCA?

The purpose of this law was to protect artists of all types (musical, visual, literary, etc.) from having their work pirated through technology. It sought to balance the rights of content creators and content consumers in the new digital era. It spells out how to enforce copyright issues that arise from technology use, and it also sets forth penalties for those who use technology to abuse copyright laws. Content creators don't have to officially register their work in order to enjoy protection. As soon as something is published, it automatically becomes protected by the DMCA.

It's important to note that this law is only valid in the United States; it's not an international treaty. This means that even if the copyright owner lives outside the US, they can still use the DMCA to make a claim if the offending website is hosted there. Even so, many businesses in other countries still respect the provisions of the DMCA because they're similar to copyright laws in their own countries.

The DMCA is meant to be flexible by not mentioning specific kinds of technology and social media. The law doesn't need to be updated every time a new kind of technology comes out.

The DMCA protects the following kinds of media:

• Written texts such as blog posts, books, and articles


• Digital images and artwork


• Digital music and other audio files


• Digital videos


• Digital software


Under the DMCA, companies and sites can be served with a DMCA takedown notice, which is an official notice that they're violating copyright law. They're told to immediately take down the offending material. If the party does not comply, the ISP can forcibly take down the content themselves. Any content creator can file a DMCA takedown notice, and the receiving party can file a counterclaim. If this happens, the content creator has 14 days to present a lawsuit.

What Is a Safe Harbor?

One provision of the DMCA is that certain places (generally websites) are designated as "safe harbors," giving these websites a safe haven from prosecution. This helps those who are acting as go-betweens from being held liable for any copyright infringement happening on their platforms. So even if an ISP technically allows you to use their service to transmit copyrighted information, the law cannot hold them accountable.

There are four safe harbors under the DMCA:

• System caching


• Information location tools


• Temporary digital network communication


• Storing information at the user's request on a system or network


9.5.6 Section Quiz (Section Quiz) q_itf_intproperty_01

The legal protection of rights to ideas and discoveries is called a copyright. What are the other ways that intellectual property can be legally protected? (Select two.)

Answers:

• *Patents


• Fair use


• *Trademarks


• Open-source


• Public domain


Explanation:

Two other ways that intellectual property can be legally protected are through patents and trademarks.

Fair use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.

Open-source refers to software that is often free and often has several optional third-party add-ons to enhance the product.

Public domain works are free for anyone to reproduce, display, and make derivatives of. q_itf_intproperty_02

Which of the following is a significant difference between a patent and a trademark? Answers:

• Trademarks require a creator to submit an application to the federal government, while patents do not.


• *Patents exist to protect creators, while trademarks exist to protect consumers.


• Patents use a wide variety of symbols, while trademarks only use one.


• Trademarks require that the public know the details of how a product works, while patents make it easy for people to know who makes the product.


Explanation:

A patent is a government-issued license that provides a temporary monopoly of an invention to its creators. Unlike patents, which are intended to protect creators, trademarks exist to protect consumers.

To get a patent, a creator must submit an application to the federal patent office, where it is reviewed by a panel of relevant experts and judges. Trademarks require no submission to a federal office.

There are a wide variety of symbols that can serve as trademarks. Patents are associated with a license, not a symbol. Trademarks exist to protect consumers; they make it easy for people to know who makes a product. The patent system guarantees the rights of inventors to make money off their inventions for a few years while making the details of the inventions public.

q_itf_intproperty_digital

Which of the following are specifically designed to help protect digital products? (Select two.) Answers:

• *Technological Protection Measures (TPM)


• Fair use


• Trademarks


• *Digital Rights Management (DRM) tools


• US Patent and Trademark office


Explanation:

Digital Rights Management (DRM) tools are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data.

Technological Protection Measures (TPM) are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data.

Fair Use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. Fair use does not provide protections for digital products.

A trademark is any word, picture, or symbol that is used to distinguish a good from other similar goods--for example, the name of a company or the logo used by a company. Trademarks do not specifically provide protections for digital products.

The US Patent and Trademark office processes patent licenses and registered trademarks, but does not specifically focus on protections for digital products.

q_itf_intproperty_facts_01

What is the collective name for creations that are not the intellectual property of anybody? Answers:

• *Public Domain


• Unclaimed Works


• Royalty Free


• Federal Reserve


Explanation:

Creations whose period of copyright protection expires fall into the public domain. Once in the public domain, a work can be used for any purpose without having to pay.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_intproperty_facts_02

Which of the following are exclusively associated with copyright protection? (Select three.) Answers:

• *Right to reproduce a work

• Right to reproduce small excerpts of a work


• *Right to lend a work


• Right for anyone to display a work


• Right to use a trademark


• *Right to make derivatives of a work


• Right to apply for a patent


Explanation:

Copyright includes the rights to reproduce, lend, and make derivatives of a work.

Fair use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. It is not exclusive to copyright protection.

The right to use a trademark is simply the ability to use any word, symbol, or picture to distinguish a good from other similar goods. It is not part of copyright protection.

The right to apply for a patent is available to inventors to receive a temporary monopoly, or protection, on their invention. It is not part of copyright protection.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_intproperty_facts_03

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Answers:

• *Fair Use


• General Welfare


• Beck's Defense


• The Ninth Amendment


Explanation:

Fair Use allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting. However, it should be noted that fair use is not a right; it's merely a legally defensible position.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.5. q_itf_intproperty_facts_04

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

Answers:

• *Trademark


• Patent


• Intellectual property


• Copyright

Explanation:

A trademark is any word, picture, or symbol that's used to distinguish a good from other similar goods.

A patent is a license given by a government that provides inventors a temporary monopoly on their invention. Anything that is owned by a copyright holder is called intellectual property.

Copyright is a set of protections granted by the federal government to creators, writers, and inventors. q_itf_intproperty_facts_05

Which of the following exist to help consumers know what products they're buying? Answers:

• *Trademarks


• Patents


• Fair Use


• Copyrights


Explanation:

A trademark is any word, picture, or symbol that's used to distinguish a good from other similar goods. They exist to protect consumers, making it easy to know who makes certain products and establishing a standard of quality that consumers can expect.

Copyright protections are granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives of, sell, rent, or lend a work.

A patent is a license given by a government that provides inventors a temporary monopoly on their invention.

Fair Use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.

q_itf_intproperty_patent

Which of the following accurately describes the characteristics of patents? (Select two.) Answers:

• Patent holders use a symbol (such as a logo) to make it easy for people to know who created their invention.


• *Patent holders are required to provide the public with details about how their invention works.


• Patents are automatically given to patent holders without the need to apply for the patent.


• *Patent holders can prevent other people from making or selling their patented invention for a limited time.


• Anything that is owned by a patent holder is called intellectual property.


Explanation:

Patent holders are required to provide the public with clear and detailed disclosure of how their invention works. Patent holders are allowed to prevent other people from making, selling, or using their patented invention for a certain amount of time.

Symbols are used as a trademark (not for a patent) to distinguish a product from other similar products, such as the name of a company or the logo used by the company.

A copyright (not a patent) is automatically given to creators of works; no application is necessary.

Anything that is owned by a copyright holder (not a patent holder) is called intellectual property. Some common examples of intellectual property are books, paintings, songs, poems, movies, and inventions. q_itf2_creativecommons_01

Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?

Answers:

• *Attribution

• No Derivative Works


• Share Alike


• Non-Commercial


Explanation:

The Attribution Creative Commons license states that anyone who uses the licensed work must give credit to the original creator. All Creative Commons licenses must include the Attribution right.

The No Derivative Works Creative Commons license states that other people may copy or distribute the original work, but they may not make changes to it. Only verbatim copies of the work are allowed.

The Share Alike Creative Commons license states that anyone who uses the work must distribute it under an identical Creative Commons license to the original.

The Non-Commercial Creative Commons license states that only the copyright holder is permitted to make money from the work.

q_itf2_creativecommons_02

Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?

Answers:

• Attribution


• No Derivative Works


• Intellectual Property


• *Non-Commercial


Explanation:

The Non-Commercial Creative Commons license states that only the copyright holder is permitted to make money from the work. Since Mary is using the image to sell a poster, she would most likely be in violation of this license type.

The Attribution Creative Commons license states that anyone who uses the licensed work must give credit to the original creator. All Creative Commons licenses must include the Attribution right.

The No Derivative Works Creative Commons license states that other people may copy or distribute the original work, but they may not make changes to it. Only verbatim copies of the work are allowed.

Anything that is owned by a copyright holder is called intellectual property. This is not a Creative Commons license type.

q_itf2_creativecommons_03

Which Creative Commons license type states that a work can be distributed as long as it is not changed? Answers:

• Attribution


• *No Derivative Works


• Share Alike


• Non-Commercial


Explanation:

The No Derivative Works Creative Commons license states that other people may copy or distribute the original work, but they may not make changes to it. Only verbatim copies of the work are allowed.

The Attribution Creative Commons license states that anyone who uses the licensed work must give credit to the original

creator. All Creative Commons licenses must include the Attribution right.

The Share Alike Creative Commons license states that anyone who uses the work must distribute it under an identical Creative Commons license to the original.

The Non-Commercial Creative Commons license states that only the copyright holder is permitted to make money from the work.

q_itf2_dmca_01

Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?

Answers:

• Safe Haven


• Fair Use


• *Safe Harbor


• Public domain


Explanation:

The Safe Harbor provision of the DMCA states that certain sites are designated as legal safe harbors. This gives a safe haven from prosecution for online service providers and others for direct copyright infringement. This helps those who are acting as internet go-betweens from being held liable for the copyright infringement others who use their systems commit.

Safe Haven is not the name of a DMCA provision.

Fair Use is a provision of the DMCA that sometimes allows for the limited use of copyrighted material.

Creations whose period of copyright protection expires fall into the public domain. Once in the public domain, a work can be used for any purpose without having to be payed for.

q_itf2_dmca_02

A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?

Answers:

• Safe Haven


• *Fair Use


• Safe Harbor


• Public domain


Explanation:

Fair Use is a provision of the DMCA that sometimes allows for the limited use of copyrighted material without the consent of the copyright owner. The use of the material must not be for a commercial purpose or substantially harm the profits the copyright holder would normally make from the work. Only a short excerpt from a copyrighted work may be used for it be considered Fair Use.

The Safe Harbor provision of the DMCA states that certain sites are designated as legal safe harbors. This gives a safe haven from prosecution for online service providers and others for direct copyright infringement. This helps those who are acting as internet go-betweens from being held liable for the copyright infringement others who use their systems commit.

Safe Haven is not the name of a DMCA provision.

Creations whose period of copyright protection expires fall into the public domain. Once in the public domain, a work can be used for any purpose without having to be payed for.

9.6 Information System Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of information systems professionals affect my daily life?


• How can I prepare for a career in information systems?


This section describes common careers in information systems. After finishing this section, you should be able to:

• Describe common careers in information systems, including project manager, systems analyst, and information systems manager.


• Identify skills and educational requirements for information systems careers.


Key terms for this section include the following:

Term Definition


Project Manager

A detail-oriented professional who manages a team to get projects done in a timely manner and under budget.


Systems Analyst

Trusted professionals who consult with organizations to help them improve the effectiveness of their information systems.


Information Systems Manager

A manager in charge of integrating different technologies and systems within an organization including data security, company policies and procedures, and quality control when implementing new systems.


9.6.1 Information Systems Careers (Lesson Video) Transcript:

Some people are naturally gifted at seeing the big picture. They enjoy working with and understanding how various components fit together in large and complex systems. Careers in information systems require the this type of holistic mindset, but they also require close attention to the details involved in systems integration. In this video, we'll explore three careers: information systems manager, project manager, and systems analyst.

An information systems manager is in charge of integrating different technologies and systems within an organization, including data security, company policies and procedures such as disaster recovery and backup, and quality control when implementing new systems. IS managers are responsible for installing and maintaining current hardware and software as well as planning for future technology needs. They recruit, hire, and supervise a team of IT professionals, coordinating and monitoring daily projects and enforcing company standards. Candidates for these positions usually hold a bachelor's degree in computer or information science and often graduate degrees in business management or information systems. Although a career in IS management requires a high level of education and experience, six figure median salaries provide a strong incentive to get into the field.

Project managers are responsible, detail-oriented professionals who know how to manage a team to get things done on time and under budget. A project manager can have a wide range of duties, including monitoring project deadlines, adjusting plans and schedules when problems arise, assigning tasks to team members, and overseeing budgets and timelines. Project managers can work in any IT field, in addition to other fields such as construction management and manufacturing engineering. Since project managers deal with many people on different teams, they need great communication skills, which allow them to coordinate with customers, their own team members, and any other stakeholders involved in a project. To get a job as a project manager in the IT world, you typically need at least a

bachelor's degree in business or computer science. Many companies also prefer that candidates have the PMP or Project Management Professional certification, along with certifications specifically designed for IT Service Management.

Systems analysts are trusted professionals who consult with organizations to help them improve the effectiveness of their information systems. They analyze and assess the performance of existing systems to suggest how a business can operate more efficiently. By understanding the business needs of their clients, talking to users, and consulting with management teams, systems analysts are in a good position to persuade business leaders to implement changes. They also produce specifications and provide user training for new or modified systems. These responsibilities require strong analytical, interpersonal, and presentation skills. In addition to a degree in computer science, information systems, or a related field, systems analysts need several years of experience working with business information systems and collaborating with engineering and development teams.

In this video, we highlighted three common careers in Information systems: information systems manager, project manager, and systems analyst.

9.6.2 Information Systems Career Facts

Careers in information systems typically require the ability to see the big picture as it relates to large and complex computer systems. They also need to understand the details involved in integrating various systems with each other. This lesson overviews a few common careers in information systems.

Table 1: Information Systems Careers Job Title

Description


Information Systems Manager

An information systems manager is in charge of integrating different technologies and systems within an organization, including data security, company policies and procedures such as disaster recovery and backup, and quality control when implementing new systems. IS managers are responsible for installing and maintaining current hardware and software as well as planning for future technology needs. They recruit, hire, and supervise a team of IT professionals, coordinating and monitoring daily projects and enforcing company standards. Candidates for these positions usually hold a bachelor's degree in computer or information science and often graduate degrees in business management or information systems. Although a career in IS management requires a high level of education and experience, six figure median salaries provide a strong incentive to get into the field.


Project Manager

Project managers are responsible, detail-oriented professionals who know how to manage a team to get things done on time and under budget. A project manager can have a wide range of duties, including monitoring project deadlines, adjusting plans and schedules when problems arise, assigning tasks to team members, and overseeing budgets and timelines. Project managers can work in any IT field, in addition to other fields such as construction management and manufacturing engineering. Since project managers deal with many people on different teams, they need great communication skills, which allow them to coordinate with customers, their own team members, and any other stakeholders involved in a project. To get a job as a project manager in the IT world, you typically need at least a bachelor's degree in business or computer science. Many companies also prefer that candidates have the PMP or Project Management Professional certification, along with certifications specifically designed for IT Service Management.


Systems Analyst

Systems analysts are trusted professionals who consult with organizations to help them improve the effectiveness of their information systems. They analyze and assess the performance of existing systems to suggest how a business can operate more efficiently. By understanding the business needs of their clients, talking to users, and consulting with management teams, systems analysts are in a good position to persuade business leaders to implement changes. They also produce specifications and provide user training for new or modified systems. These responsibilities require strong analytical, interpersonal, and presentation skills. In addition to a degree in computer science, information systems, or a related field, systems analysts need several years of experience working with business information systems and collaborating with engineering and development teams.

9.6.3 Interview: Project Manager (Lesson Video) Transcript:

And so it's interesting, it's an interesting dynamic for me being a non-developer working with developers, and I've definitely had to learn a different language doing that.

What I love most about my work, you know, I'm deeply driven by serving others, and I think that's what project managers do, cause you're either the savior or the scapegoat. A lot of times I act as the shield for my developers against the clients. It gets to the point where I need to protect my developers because they need to be in a safe spot all the time so they feel comfortable developing. I own as a project manager the execution, the deliverable and all the communication. Sometimes, I think of myself as the chief accountability officer. I really do love just serving and I think that's what the biggest part of being a project manager is.

And I was thinking of just different avenues of ways you can get in and honestly, humanities. So I have a team of developers here and also have a team of developers in the Philippines. You know, humanities teaches you a lot of skills that are kind of vanishing in some regards. Just anything that will teach empathy. I really feel strongly that that is one area that you should learn if you ever want to become a project manager.

For me the perfect project management route would be if you were able to either get a major in humanities with a minor in some type of tech or vice versa. Someone needs to be able to read well, write well, and present themselves well. But I also did audit a dev boot camp, and it's a very rare opportunity to be able to do that. But it gave me a glimpse into that developer life and how to code. For me, learning the principles behind coding, I feel like it made me a little bit more valuable. It's an interesting dynamic for me being a non-developer working with developers and I've definitely had to learn a different language.

The last words of wisdom that I can offer is really just figure out if it's something that you really want to do, and you do that by finding a mentor. You want to find someone who's been doing it for a while. Figuring out the types of companies that you want to work for and find out who the project managers are. Go to some of the startup events. You can say, "Hey, I just want to help you, can I do anything? Even if it's just customer service I'll do it for free. I just wanna learn from you." Guys eat that opportunity. They love it when they see other people that are just hungry to learn from an opportunity.

9.6.4 Section Quiz (Section Quiz)

10.0 Cybersecurity

10.1 Chapter Introduction


A pair of robots behind a firewall protecting two people from malicious attacks from cybercriminals. Illustration. Cybersecurity

This chapter introduces various strategies and tools for responding to data security threats. It describes how system administrators use authentication, data encryption, device security, and business continuity plans to protect valuable information. Students practice recognizing social engineering exploits, configuring access control, encrypting files, configuring device security, and implementing fault tolerance. The chapter concludes with a brief look at common careers in cybersecurity.

After finishing this chapter, you should be able to:

• Describe common threats to data confidentiality, data integrity, and data availability.


• Evaluate email messages to determine if they represent possible social engineering attacks.


• Describe common access control frameworks.


• Configure account access on various computing devices.


• Encrypt files on a computer.


• Configure antimalware and firewalls to protect computer systems.


• Implement fault tolerance and disaster recovery for different types of data.


• Identify common careers in cybersecurity.

10.2 Security Threats Section Introduction

As you study this section, keep the following questions in mind:

• Why is computer security a vitally important issue?


• What could an attacker do if they got access to my private information?


• How can I protect myself from social engineering?


This section introduces you to the most common threats to data confidentiality, integrity, and availability. After finishing this section, you should be able to:

• Explain how much privacy you can expect when using the internet for social networking, file sharing, and financial transactions.


• Explain how much privacy you can expect when using computers at work.


• Describe the most common threats to data confidentiality.


• Describe the most common threats to data integrity.


• Describe the most common threats to data availability.


• Identify common social engineering techniques used by hackers to gain access to online data.


• Evaluate email messages to determine if they represent a possible social engineering attack.


• Identify the most common types of malware, including viruses, worms, Trojan horses, ransomware, and spyware.


• Identify specific types of password attacks, including dictionary attacks and brute-force cracking.


• Explain how to protect yourself against identity theft.


Key terms for this section include the following:

Term Definition


Snooping

Attempting to secretively discover private information about a person, company, or other entity.


Wiretapping

A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.


Social Engineering

The use of deception to gain personal and/or private information for unlawful purposes.


Reconnaissance

The passive gathering of information about a potential victim.


Pretexting

Tricking a victim into revealing sensitive information under false pretenses.

Email Attack

Exploiting a victim using email messages.


Browser Attack

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.


Man-in-the-Middle Attack

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.


Replay Attack

An attempt to connect to a server by capturing and resending authentication information.


Impersonation

TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.


Denial of Service

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.


Malware

Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.


Password Attack

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.


Identify Theft

An occurrence in which thieves steal other people's personal and financial information for their own personal gain.


10.2.1 Confidentiality Concerns (Lesson Video) Transcript:

One of the biggest challenges in data security is protecting confidential information. Usernames, passwords, bank account numbers, and other information can all be used by malicious attackers to obtain unauthorized access to a system. In this video, we'll introduce some of the most common ways people can steal confidential information.

Let's start with snooping, which is often an insider threat within organizations. For example, an employee may casually observe a confidential email on a fellow employee's computer. He then waits for an opportunity to look at additional emails when the computer is left logged in but unattended. Another example is an IT employee who uses her administrative access to snoop in confidential employee files.

Wiretapping is a common threat that involves the direct use of technology. Since the invention of the telegraph, both criminals and law enforcement officials have engaged in wiretapping. In the digital world, wiretapping is a form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network. With the proper tools, unauthorized people can intercept data on either a wired or a wireless network. One of the best ways to protect against wiretapping threats is to use data encryption.

Now you might be surprised to know that attackers are often more successful in obtaining confidential information using social techniques rather than technology, such as wiretapping. These techniques are collectively referred to as social engineering.

To stay safe, you should be aware of social engineering exploits that are common on the Internet. Attackers often trick

victims into revealing sensitive information. Social engineering attacks may be done in person, on the phone, in a browser window, or through an email message.

There are many kinds of social engineering exploits. Reconnaissance passively gathers information about a potential victim. The goal is to identify important information needed to further exploit the victim. Common reconnaissance techniques including shoulder surfing, eavesdropping, and dumpster diving.

Shoulder surfing involves looking over a user's shoulder, looking for sensitive information displayed on the screen or even watching keystrokes being typed on a keyboard.

Eavesdropping involves overhearing a conversation to obtain sensitive information.

Dumpster diving involves searching through trash looking for discarded documents containing sensitive information. Another social engineering technique is called pretexting, which attempts to trick the victim into revealing sensitive information under false pretenses. Pretexting can take many forms. For example, intimidation attempts to frighten a user into revealing information or performing an action. The attacker assumes a false position of authority over the victim and attempts to intimidate a user into providing sensitive information.

Familiarity uses the premise of a supposed friendship to convince the victim to do something that they should not, such as provide sensitive information.

Social validation uses peer pressure to coerce the victim into bending rules or revealing information that they shouldn't. Email attacks are a form of social engineering that attempt to exploit a victim using email messages. Email attacks come in several forms:

Phishing emails are crafted to appear as though they were sent from a legitimate organization, such as a bank or an e- commerce website. These emails convince the user to click on a link that takes them to a malicious website where they are then tricked into providing sensitive information. A variation of this attack is called spear phishing, which involves first gathering as much information about the victim as possible, such as identifying which online banks they use or where they shop online. The attacker then sends phishing emails that appear to be from the trusted bank or web store. Nigerian scams use emails to trick the user into to sending a small amount of money in return for a supposedly greater amount of money later.

Email hoaxes prey on email recipients who are overly-trusting. Usually these hoax messages trick the reader into deleting key system files or downloading malware.

Browser attacks are a type of social engineering that convinces the victim that they are performing a legitimate task within their web browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer.

Browser-based attacks can take many forms. Pharming redirects web traffic sent to a legitimate site to a malicious site that looks identical to the real website. Once there, the attacker tricks the victim into supplying sensitive information, such as usernames, passwords, bank account numbers, or credit card numbers.

Rogue anti-virus attacks employ a pop-up browser window that tells the user their computer is infected with a virus and that they must click a link to clean it. Sometimes this exploit merely tricks users into paying for worthless software they don't need. However, it is also frequently used to install malware on the victim's computer.

Technological security measures are only partially effective against these types of attacks. The best defense is user education and awareness.

In this video, we learned about snooping, wiretapping, and several common social engineering exploits you may face on the Internet. The first step in keeping your data confidential is to be aware that these threats exist.

10.2.2 Confidentiality Facts

One of the biggest challenges in data security is protecting confidential information. Malicious attackers can use usernames, passwords, bank account numbers, and other information to obtain unauthorized access to a system. This lesson covers the topic of threat awareness.

Threat Awareness

The first step in keeping your data confidential is to be aware that threats exist. The table below summarizes some of the most common ways attackers can steal confidential information.

Table 1: Data Confidentiality Threats Threat

Description


Snooping

A technique used to secretively discover private information about a person, company, or

Wiretapping

A common threat that involves the direct use of technology. In the digital world, wiretapping


Social engineering

Techniques that use deception to gain personal and/or private information for unlawf


Reconnaissance

A type of social engineering exploit that passively gathers information about a


Pretexting

A engineering technique that attempts to trick the victim into revealing sensitive information

Email attacks

A form of social engineering that attem


Browser attacks

Browser attacks are a type of social engineering. The attacker tries to convince the


10.2.3 Integrity Concerns (Lesson Video) Transcript:

In addition to protecting confidential information, data security professionals need to ensure data integrity. This means avoiding data corruption caused by malware, preventing unauthorized changes to data, and making sure data arrives intact and unaltered at its intended location on a network. In this video, we'll discuss some of the most common threats to data integrity.

A man-in-the-middle attack is a real-time attack on a live network connection. Let's say we have a client and a server that are communicating with each other. During a man-in-the-middle attack, a hacker intercepts the communication stream between these two. Simultaneously, the hacker's computer tricks the client into thinking it's the server and tricks the server into thinking it's the client. The hacker can then intercept and modify the data in transit. With the right software and the right vulnerabilities, this attack is quite easy to perform.

Man-in-the-middle attacks are commonly used to steal credit cards, online bank credentials, and confidential personal and business information.

Another type of networking session attack is a replay attack. In a replay attack, a hacker sniffs the packets between a client and a server in hopes of catching authentication information.

When the client and server are no longer communicating, the hacker resends the captured authentication material and tries to connect to the server.

The server thinks the hacker's computer is the original client and accepts the connection. In this case, the hacker doesn't even have to decrypt the captured authentication information. He can simply submit the still-encrypted credentials and hope the target system just accepts them, whatever they may be. After authenticating to the system, the hacker gains access to the victim's resources or data.

The term impersonation usually refers to a social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system. But hacking technology can also be used more directly to hijack a networking session and masquerade as another identity.

For example, in a TCP session hijacking, the attacker gains access to a host on the network and then logically disconnects it. After cutting off the client end, the hacker then pretends to be the client, tricking the server.

The concept of session hijacking can also be used with an HTTP session. For example, the hacker could hijack someone's cookies from their web browser. To the web server, the hacker appears to be the original web client and just takes over the original HTTP session that's already been initiated.

Man-in-the-middle attacks, replay attacks, and session hijacking are often used to gain unauthorized access to a system. With system access, hackers can steal even more confidential information. They can also alter or corrupt data. Cyber criminals often launch destructive malware attacks that compromise data integrity and disrupt communication networks. In this video, we learned about data integrity threats, including man-in-the-middle attacks, replay attacks, and

impersonation. We also discussed how attackers can alter data through authorized access to a system.

10.2.4 Integrity Facts

In addition to protecting confidential information, data security professionals must ensure data integrity. This means avoiding data corruption caused by malware, preventing unauthorized changes to data, and making sure data arrives intact and unaltered at its intended location on a network.

The following table describes some of the most common threats to data integrity. Table 1: Data Integrity Concerns

CONCERN DESCRIPTION


On-path attack

An on-path attack (also known as a man-in-the-middle attack) is a real-time attack on a live network connection. In this type of attack, a hacker intercepts communication between a client and a server. The hacker's computer impersonates the server to the client. At the same, the hacker impersonates the client to the server. The hacker can then intercept and modify the data in transit. With the right software and the right vulnerabilities, this attack is quite easy to perform. On- path attacks are commonly used to steal credit cards, online bank credentials, and other confidential information. On- path attacks are often able to capture data being sent in plain or clear text (text that has not been encrypted). Encrypted text is known as cipher text. The process or algorithm used to encrypt/decrypt the cipher text is known as the cipher.


Replay attacks

In a replay attack, a hacker sniffs the packets between a client and a server in hopes of obtaining authentication information. When the client and server are no longer communicating, the hacker resends the captured authentication material and tries to connect to the server. The server thinks the hacker's computer is the original client and accepts the connection. In this case, the hacker doesn't have to decrypt the captured authentication information, only submit the still- encrypted credentials. After authenticating to the system, the hacker gains access to the victim's resources or data.


Impersonation

The term impersonation usually refers to a social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system. In hacking technology, it can also refer to hijacking a networking session and masquerading as another identity. For example, in a TCP session hijacking, the attacker gains access to a host on the network and logically disconnects the client; the hacker then pretends to be the client. The concept of session hijacking can also be used with an HTTP session. For example, the hacker could hijack cookies from a web browser. To the web server, the hacker appears to be the original web client and takes over the original HTTP session that's already been initiated. If an attacker captures a user's username and password through social engineering or other means, the attacker could impersonate the user by logging into the user's account with the captured authentication credentials.


Unauthorized changes

On-path attacks, replay attacks, and session hijacking are often used to gain unauthorized access to a system. With system access, hackers can steal even more confidential information. They can also alter or corrupt data. Cyber criminals often launch destructive malware attacks that compromise data integrity and disrupt communication networks.


10.2.5 Availability Concerns (Lesson Video) Transcript:

In addition to confidentiality and integrity, IT professionals need to be concerned about the availability of important company data. If employees are unable to access digital resources when they need them, companies lose valuable time and money. In this video, we'll discuss some of the most common threats to data availability.

The goal of a denial of service attack is to overload a system so that the services it provides are no longer available to legitimate network clients. To understand how these attacks work, let's look at a simple analogy. Suppose you went to the bank to deposit a check. When you get to the bank, you find that the lobby is completely filled with people and you're unable to get inside. To top it all off, none of the people inside the bank even have a bank account. They're just

there to disrupt the bank's ability to service actual customers.

This is similar to how a denial of service attack occurs. For example, let's say your company has a web server that provides product manuals and driver downloads to customers. With a denial of service attack, the attacker overloads the server with bogus requests to the point where a legitimate request from actual customers will never get through. In some cases, a denial of service attack may even exploit a flaw in the operating system of the server that can cause it to reboot or crash.

A variation of this type of attack is called a distributed denial of service attack. In this case, the attacker uses bot malware to enlist multiple systems to increase the magnitude of the attack. The compromised systems, called zombies, are infected with malware that allows them to be remotely manipulated by an attacker who's often called a zombie master.

Now let's talk about power outages. We all know that without electricity, computer systems turn off and lose access to data. But an even bigger concern is that when a computer system loses power abruptly, it can corrupt and lose data. This is why critical systems such as database servers and web servers need to be equipped with a UPS, or uninterruptible power supply. These systems provide a temporary power source during an outage that gives the system enough time to shut down cleanly without data loss or corruption.

Hardware failures can occur for a number of different reasons, such as power surges and spikes, overheating, and dust accumulation. While some of these causes can be prevented, computer components such as hard disks will eventually fail. To maintain access to data on critical systems, most businesses maintain redundant copies of data on separate disks. System administrators are often responsible for the disposal and destruction of sensitive data stored on old hard disks.

This is particularly important when storage devices leave an organization. However, data destruction can also occur for malicious or accidental reasons. Natural disasters, acts of terrorism, and accidental coffee spills can all harm computer components and destroy data. To prepare for these events, businesses need to store regular backups of data in different locations.

As businesses rely more and more on cloud hosting solutions for their products and services, their productivity depends on the reliability and quality of their Internet connection. However, even if the Internet is up and running, employees may not be able to access their files when the cloud service is down. Google, Amazon, Microsoft, and other cloud hosting businesses work hard to avoid any downtime, but there will always be short periods of hardware or software failure. For this reason, businesses should keep offline copies of any critically important files or applications.

In this video, we learned about threats to the availability of digital resources, including denial of service attacks, power outages, hardware failures, data destruction, and service outages. Responding to these threats needs to be part of any company's disaster recovery plan.

10.2.6 Availability Facts

In addition to confidentiality and integrity, IT professionals need to be concerned with the availability of important company data. If employees or customers are unable to access digital resources when they need them, companies lose valuable time and money.

The table below summarizes some of the most common threats to data availability. Table 1: Data Availability Concerns

THREAT DESCRIPTION


Denial of service (DOS)

The goal of a denial of service attack is to overload a system so that the services it provides are no longer available to legitimate network clients. To understand how these attacks work, consider a simple analogy. Suppose you went to the bank to deposit a check. When you get to the bank, you find that the lobby is filled with people and you're unable to get inside. None of the people inside the bank are bank customers. They're there only to disrupt the bank's ability to service customers. This is similar to how a denial of service attack occurs. For example, let's say your company has a web server that provides driver downloads to customers. With a denial of service attack, the attacker overloads the server with false requests to the point that legitimate requests can't be processed. In some cases, a denial of service attack may even exploit a flaw in the operating system of the web server that can cause it to reboot or crash. A variation of this type of attack is called a distributed denial of service attack (DDOS). In this case, the attacker uses bot malware to enlist multiple systems to increase the magnitude of the attack. The compromised systems, called zombies, are infected with malware that allows them to be remotely manipulated by an attacker who's often called a zombie master.

Power outage

We all know that without electricity, computer systems won't work. A bigger concern is that when a computer system loses power abruptly, it can corrupt and lose data. This is why critical systems such as database servers and web servers should be equipped with an uninterruptible power supply (UPS). These systems provide a temporary power source during an outage that gives the system enough time to shut down cleanly without data loss or corruption.


Hardware failure

Hardware failures can occur for many reasons, such as power surges, power spikes, overheating, and dust accumulation. While some of these causes can be prevented, computer components such as hard disks will eventually fail. To maintain access to data on critical systems, most businesses maintain redundant copies of data on separate disks.


Data destruction

System administrators are often responsible for the disposal and destruction of sensitive data stored on old hard disks. This is particularly important when storage devices leave an organization. However, data destruction can also occur for malicious or accidental reasons. Natural disasters, acts of terrorism, and accidental coffee spills can all harm computer components and destroy data. To prepare for these events, businesses should store regular backups of data in different locations.


Service outage

As businesses rely more and more on cloud hosting solutions for their products and services, their productivity depends on the reliability and quality of their internet connection. However, even if the internet is up and running, employees may not be able to access their files when the cloud service is down. Google, Amazon, Microsoft, and other cloud hosting businesses work hard to avoid any downtime, but there will always be short periods of hardware or software failure. For this reason, businesses should keep offline copies of any critically important files or applications.


10.2.7 Digital Privacy (Lesson Video) Transcript:

Most people expect to have some measure of privacy in their daily lives. Indeed, most countries have laws that protect the privacy of their citizens to a certain extent. However, when the Internet is involved, privacy is never a cut-and-dried issue. For the data from this video to get to you, it had to travel through several networking devices and cables and be processed by dozens of software programs and protocols, each owned by someone else. In this video, we'll discuss the privacy you can and can't expect when you use the Internet.

First, we'll talk about privacy as it relates to social media, email, instant messaging, and file sharing services. Generally, these services have controls that let users decide what information is available to which people. For example, a social media user may want their text posts to be visible to the general public but only allow friends to view their pictures and not let anybody see their phone number and email address.

That said, it's important to understand that when you signed up for your social media or email account, you agreed to that company's terms of use. Facebook, Instagram, and Gmail don't provide their services for free because they're nice – they do it because they want to make a profit. One of the ways they do this is by extracting metadata from information they process on your behalf. Metadata, or "information about information," can include where and when you use the service, what language you use, what sites you access, keywords from your posts and messages, what kind of device you're using, and how often you interact with different elements. These companies analyze this data and use it for marketing and advertising. They can also sell their metadata to other companies.

Next, let's talk about privacy as it relates to using computers at work. It's easy for employees to think their access to the Internet at work should be completely unrestricted. However, this simply isn't the case. In most cases, the company owns or pays for the computers, the network infrastructure, and the Internet connection, not to mention the time of any employees working for an hourly wage. Because inappropriate computer use can be a huge liability for a company, most companies require employees to agree to an acceptable use policy. The content of these policies vary depending on the organization. Nearly all companies prohibit employees from accessing adult content or engaging in illegal activities.

Some policies restrict personal computer use to designated break times, and others prohibit it altogether. While companies are well within their rights to impose any restrictions they see fit, most recognize that being too restrictive

tends to drive employees away.

Another vital thing to realize when using a computer at work is that any communications made through a company's network, including private email, may be stored and monitored. Therefore, employees should exercise judgment and caution when using company computers for personal use, even when such use is allowed by the acceptable use policy. In this video, we discussed digital privacy. We talked about expectations of privacy when using the Internet and when using computers at work.

10.2.8 Digital Privacy Facts

Most people expect to have some measure of privacy in their daily lives. Most countries have laws that protect the privacy of their citizens. However, when the internet is involved, privacy is never a certainty. When you use the internet, your data travels through several networking devices is processed by dozens of software programs and protocols, each owned by someone else.

Therefore, it is important to understand that when using digital data, extra measures should be taken to protect information. In addition, it's important for a company to create policies, guidelines and procedures, that outline specific rules for protecting sensitive data. Such topics should include the use of social media, physical security requirements, and access to private information.

The following table discusses the privacy you can and can't expect when you use the internet, mobile devices, physical facilities. The table also identifies the types of documentation that should be created to ensure employees and contractors know what can and cannot be done.

Table 1: Privacy Expectations TERM

DESCRIPTION


Social media and email

Social media, email, instant messaging, and file sharing services generally have controls that let users decide what information is available to which people. For example, a social media user may want text posts to be visible to the general public, but only allow friends to view their pictures, and not let anyone see the phone number and email address. However, anyone who uses online services should be aware that any information they share will likely be made available to third parties, including advertising and marketing firms, government institutions, and others who are interested in analyzing big data.


Marketing metadata

It's important to understand that when you signed up for your social media or email account, you agreed to that company's terms of use. Facebook, Instagram, and Gmail don't provide their services for free because they're nice; they do it because they want to make a profit. These companies make profits by extracting metadata from information they process on your behalf. Metadata (information about information) can include where and when you use the service, the language you use, the sites you access, keywords from your posts and messages, the kind of device you're using, etc.

These companies analyze the data and use it for marketing and advertising. They can also sell their metadata to other companies.


Secure transactions

Entering personal information or conducting financial transactions online is convenient and efficient. However, consumers need to adopt safeguards to protect themselves against identity theft and fraud. Safeguards include sharing a mobile device only with people you trust, never using public Wi-Fi to conduct ecommerce, using strong account passwords, verifying that all online transactions are conducted using data encryption (HTTPS), and conducting ecommerce transactions only with businesses you trust.


Internet usage monitoring

Some employees may think that access to the internet at work should be completely unrestricted. However, this isn't the case. Consider that the company owns or pays for the computers, the network infrastructure, and the internet connection, not to mention the time of the employee. Because inappropriate computer use can be a huge liability for a company, most companies require employees to agree to an acceptable use policy (AUP) or a fair use policy. These types of policies specify exactly what can be done with such things as the corporate network, website, computer/systems, and facilities.

The content of these policies vary depending on the organization. For example, nearly all companies prohibit employees from accessing adult content or engaging in illegal activities. Some policies restrict personal computer use to designated break times, and others prohibit it altogether. In addition, some companies use these policies to specify the type of hardware or software that can be installed on the employee's company computer. While companies are within their rights to impose any restrictions, most recognize that being too restrictive tends to drive employees away. Another issue is any communications made through a company's network, including private


email, may be stored and monitored. Therefore, employees should exercise judgment and caution when using company computers for personal use, even when such use is allowed by the acceptable use policy.

Employees often bring their own devices (laptops, tablets, and phone )to the workplace. The employer has the right to expect employees to follow rules of behavior. These rules should be implemented to protect the network and the organization as each device brought in increases the vulnerability of the network.


Data protection

To improve the security of sensitive information on your device if it is lost or stolen, you should consider the following:

• Remote wipeThis feature allows you to send a command to your mobile device to delete data. It can keep sensitive information from falling into the wrong hands.


• Screen lockWhile determined hackers can find ways around a screen lock, having a lock will keep casual users from getting access to your device.


• Locator appLocator applications might help you find a misplaced device before a determined hacker does. Turning off locations services does not improve your device's security and it will make it harder to find your device if you lose it.


To avoid having your mobile device exploited by a hacker or infected by a virus, you should consider the following:

• Operating system updatesKeeping the operating systems up to date with the latest updates and patches ensures you have fixes for known security issues.


• Device authenticationIt's important to configure your screen lock to require some sort of authentication to physically access your device.


• Anti-malwareAnti-virus apps can protect your device. Make sure to research, find, and install the most effective ones.


Workplace surveillance

Employers may implement guidelines and methods to monitor many aspects of the workplace. This type of workplace surveillance is often classified as follows:

• Physical monitoringPhysical monitoring is often used to monitor the physical whereabouts of employees while on company property. This usually done with some type of camera (CCTV). This helps ensure the security of not only the company's assets but can also help in protecting the employees. In addition, some companies may have requirements for alcohol and drug testing.


• Security assuranceSecurity assurance polices allow companies to monitor the type of data employees send to ensure that they are not divulging confidential information or are compromising the company's security.


• Monitoring dataTo gain an understanding of an employee's productivity, some companies monitor and analyze data communication, such as the duration of phone calls made.

10.2.9 Malware Types (Lesson Video) Transcript:

Malware is software designed to infiltrate or damage a computer system without the owner's consent or knowledge. Malware often attempts to hide itself. Some malware even takes control of the computer system.

In this video, we'll discuss several common types of malware.

A virus is an application or string of code attached to a file that's designed to spread from file to file. Viruses have three characteristics: a replication mechanism, an activation mechanism, and an objective.

Viruses are difficult to identify. They're stealthy, and they come in many different forms.

The most effective way to prevent computer viruses from spreading is to install antimalware software and configure regular system scans. Be sure to scan removable storage, too, such as external USB drives and email attachments.

Scanning only detects malware after it's infected a storage device on your system, so you should also enable real-time protection. Real-time protection alerts you when it detects malware in the process of installing itself. Essentially, real- time protection blocks malware before it can infect your system.

Next, let's discuss worms. Unlike a virus, a worm can propagate itself without a file. A worm is a type of malicious software that travels across computer networks, automatically replicating itself. Worms are a particular concern because they can spread through the internet to millions of unprotected computers very rapidly. Worms usually take advantage of unpatched vulnerabilities in computer systems. To avoid a worm infection, keep your systems patched and install antimalware.

A Trojan is a particularly stealthy type of malware. It's named after the Trojan horse from Greek mythology. A Trojan appears to be benign software like a screensaver or a game. It contains malicious code embedded within an apparently useful application. A user may download and install a Trojan and then use it for legitimate purposes, not realizing that they also installed malware.

Trojans can cause a lot of damage. For example, one could create a back door in the system and establish communication with the attacker, allowing him to control your computer remotely.

Trojan-infected computers are widely used to perform Distributed Denial of Service attacks, or DDoS. This is when a website or application is overwhelmed with remote connections, and it can't process all of them in a timely manner. It's an attempt to bring the service down, given that the amount of access points is not supported.

Some ways to prevent this attack are to increase application capacity by increasing the number of backup servers, to implement redundancy, or to contract a specialized company to be responsible for that application's security.

Next, let's look at spyware. Spyware is designed to intercept data or assume partial control over the computer. Spyware often collects personal information about the user, such as internet surfing habits and passwords. It uses tracking cookies to collect data about a user's activities. Spyware might also install additional software, change computer settings, or redirect web browsers to unwanted sites.

Adware is a similar type of malware. It automatically plays, displays, or downloads advertisements to the computer. Frequently, adware incorporates the same functions as spyware. Both types of malware invade the user's privacy.

Adware can spy on your browsing activity and display advertisements based on your browsing history. Using a pop-up blocker and installing antimalware software are your best defenses against spyware and adware.

There are several key measures you can take to prevent falling victim to malicious software. First, be sure to use the latest version and patch level for your web browser.

Second, install the latest updates for your operating system.

Third, install antimalware software on every computer system. Be aware that not all antimalware software is equally effective. You can use a search engine to view the latest antimalware rankings and determine which package is most effective for your needs.

Fourth, after you select and install an antimalware package, be sure to update its definitions database constantly. Configure it to scan your file system regularly and enable real-time protection to block infections before they occur. If an antimalware scan detects malicious software, you should quarantine it or delete it.

Fifth, protect your computer with host-based firewall software. This prevents external, and possibly malicious, hosts from establishing connections with your computer.

Sixth, use a pop-up blocker to prevent adware. Most modern web browsers provide pop-up blockers that are simple to enable.

Seventh, carefully manage the use of cookies on your system. Some cookies are useful, but others are risky. Most web browsers allow you to specify which types of cookies you want to allow and which you want to block.

In this video, we discussed several types of malware. We looked at viruses, worms, Trojans, DDoS attacks, spyware, and

adware.

10.2.10 Password Attacks

A password attack occurs when a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information. There are many different methods that hackers use to commit password attacks, and many of them are exploitations of passwords that are too simple and easy to guess. Though there's no foolproof method to protect every account, there are steps that users can take to remain as secure as possible. Knowing the strategies that hackers use can be helpful in protecting yourself against malicious attacks.

Types of Password Attacks

Dictionary attacks take advantage of people who use short, common words or combinations of these words as their passwords. It's called a dictionary attack because some hackers can literally try every word in the dictionary! This is quite a long list as there are over one million words in the English language and over 3 million combinations of six letters.

To initiate the attack, the hacker tries a long list of common words, together with numbers before or after them like people often use. They sometimes use company usernames so that they can try passwords based on peoples' names. This type of attack only works when a site or program doesn't lock users out after a certain number of invalid attempts.

Sometimes, a dictionary attack is used to uncover the decryption key so that encrypted data can be decrypted and stolen in a traffic-interruption attack.

The following diagram shows how a dictionary attack works:


Representation of how a dictionary attack works. Diagram.

A brute force attack is where an attacker tries to use every possible combination of letters and numbers until the find a password. For example, they may try aaaaaaa, then aaaaaab, then aaaaaac, and so on. This is a bit like a huge army attacking a fort. The defenses might be able to keep out most attackers, but the sheer numbers will eventually overwhelm them. Hackers need an incredibly large number of attempts because of the astronomical numbers involved. For example, in an 8-character alphanumeric password that allows both uppercase and lowercase letters, there are over 200 trillion possible combinations! It's easy to see why these kinds of attacks require a great deal of computing power.

The following diagram shows how a brute force attack works:


Representation of how a brute force attack works. Diagram.

A traffic-interruption attack uses software to interrupt network traffic and intercept passwords as they're passed between computers. This is easier to steal if the information isn't encrypted.

During a man-in-the-middle (MITM) attack , a hacker impersonates a website or app to convince someone to input their password, which they then steal.

During a keylogger attack , a hacker manages to install software on another person's computer to record that person's keystrokes. The next time someone enters their password, the hacker will have a record of which keys they pressed. Social Engineering Attacks

Social engineering attacks are another kind of digital attack that can be used to steal information from a user. Hackers send fake emails, messages, or texts pretending to be someone else, often from a reputable company such as Amazon or Microsoft. They use these to trick people into giving them their personal information. In a phishing message, there might be signs that something is off, like a logo that doesn't look quite right or an email address that's misspelled (such as Guggle instead of Google).

It's a good idea to avoid clicking on any email links that come from senders you don't know. When in doubt, call the company's customer service line and ask if they were actually trying to contact you. Reputable companies almost never ask for personal information in an email.


A group of criminals using fishing rods to 'phish' for information. Illustration. How to Protect Yourself Against Password Attacks

The best defense against password attacks is to make your passwords as strong as possible . This means including a mix of uppercase and lowercase characters, special characters (such as !, ?, or *), and numbers. Avoid common words and phrases that are easily guessed or are too short. Don't use part of a site's name in your password either.

It's also a good idea to use two-factor authentication when possible. Many times after you choose a password for an account, you're asked to confirm your identity a second way. This may mean that a code is sent to you in a text that must be entered before you're allowed to log in, or it could be a personal question you must answer.

Companies often use Single Sign-On (SSO) protocols to keep their accounts secure. This means that you only need a

single strong password to log into all the different company apps.

Another good idea is to pay attention to the kind of connection you're using . If you're using a public Wi-Fi network, any information that you transmit can easily be intercepted by hackers. If you're using an unsecured network that doesn't require a password to access, never transmit sensitive personal or financial information.

Finally, an important part of combating password attacks is to simply keep a close eye on your accounts . If you notice any suspicious activity or your friends tell you that they've received strange messages from you, change your password right away. If possible, report any unauthorized posts to the site in question.

10.2.11 Identity Theft

When doing business online, it can be easy to forget that there are many people out there who are trying to take advantage of others. Some of these are identity thieves who steal other people's personal and financial information for their own personal gain. This information is often referred to as Personally Identifiable Information (PII).

It's important to know how to recognize the signs that your identity has been stolen and, more importantly, what you can do to prevent this from happening. Prevention is always the best remedy. Trying to fix a problem after the fact can be both expensive and time consuming.

This lesson covers the following topics:

• What is identity theft?


• What is identity fraud?


• How can I protect myself?


• What if my identity is stolen?


What Is Identity Theft?


A pair of criminals vacuuming out ID information from a computer onto their own computer. Illustration.

Identity thieves want your PII. This information is often used to confirm your identity, either by phone or over the internet. With your PII, identity thieves can do things like open phony credit cards and bank accounts in your name. They may also use your email accounts to send spam to others.

You are probably a victim of identity theft if:

• Friends or colleagues tell you that they received strange messages from you or that your social media account has been posting strange messages.


• You get bills for items you didn't order or credit card statements for cards you didn't open.


If you suspect identify theft, immediately contact your financial institutions. Change passwords for all compromised accounts, financial, social media, etc. You can usually report the fraudulent content as well so that it can be removed. In addition to the loss of money, identity theft can have many other consequences. It can ruin your credit rating, cause your tax filing to be denied, and even get you into legal trouble.

What Is Identity Fraud?

The terms identity fraud and identity theft are often used interchangeably. However, they are not the same. Identity theft is the process of stealing a person's PII. Identity fraud is the use of the stolen information for illicit gain.

In many cases, identity fraud can indicate that an attacker has compromised someone's computer. To protect against identity fraud, companies should always use as many means as possible to perform identity checks to ensure that the person setting up an account is really who they say they are. We will discuss implementing other steps next.

How Can I Protect Myself?

There is no way to completely protect yourself from identity theft and identity fraud. There are measures that you can take to minimize the risk.

One of the best ways to protect yourself is to make sure that you use strong passwords for all your online accounts. This includes your email accounts, social media accounts, and especially your financial accounts.

Use the following these guidelines to create a strong password:

• Don't use information that can be easily guessed or looked up, such as your birthday.

• Use a combination of uppercase and lowercase letters.


• Include numbers.


• Use special characters such as !, ?, #, and $


• Don't make your password too short. Longer passwords are more secure


It's important to not share your password with people you don't know. A common tactic of identity thieves is phishing, in which they send out what look like official emails from well-known companies like Google or Amazon. These emails often ask for personal information. Keep in mind:

• Identity thieves often copy logos and fonts from official emails to make their emails look legitimate. One of the best ways to spot a phishing email is to look at the sender's email address. Often, it will be something strange or slightly misspelled, such as Microsuft.com instead of Microsoft.com.


• When in doubt, don't click any links in suspicious emails. Most reputable companies won't ask you to give personal information through email. Simply clicking a link may be enough for the identity thief to install malicious software onto your computer.


More safe browsing practices to implement include:

• When shopping online, use a credit card instead of a debit card. It's much easier to dispute fraudulent charges made on a credit card than it is for a debit card.


• Be sure your browser is regularly updated and any plug-in software is up to date.


• Install anti-malware software on your network or device.


• Always implement secure wireless router configurations on any wireless networks to prevent unauthorized access.


• Always use a secure Wi-Fi connection when possible. o Never transmit personal or financial information over the internet if you are on a public, unsecured connection such as at a library or airport. These types of networks are not secure and can easily be hacked.


o If using a public workstation, clear all caches before shutting down and do not plug in any personal devices, as the public workstation could be infected with malware.


What If My Identity Is Stolen?

There are many companies today that offer identity theft protection services. With these services, you let them monitor your bank accounts and they flag and notify you of any suspicious activity right away. These services usually charge a monthly fee.

Sometimes, the company may contact you to confirm whether a suspicious charge was really made by you. For example, if you live in the United States, and suddenly your account is used to purchase hundreds of dollars of merchandise in Japan, the company may freeze your account. This could be inconvenient—perhaps you're simply on a trip in Japan— but it's a small price to pay for the mental and emotional security you get from such protection.

If you think you've been a victim of identity theft, act as quickly as possible to minimize the damage. If someone has stolen your password, change all your passwords as quickly as possible. If someone has access to your credit or debit card, contact your bank, cancel the account immediately, get a new card issued, and open a claim regarding the fraudulent charges to resolve the issue.

10.2.12 Recognize Social Engineering Exploits 1 (Demo Video) Transcript:

In this video, we'll look at the messages in an email inbox and identify which are social engineering exploits. We'll be looking specifically for possible phishing or whaling attacks.

This first email claims to be from the Microsoft Windows Update Center. However, there are a variety of spelling errors, which wouldn't likely happen if it were really from Microsoft. If we hover over the link, we can see in the bottom-left corner of the screen that it directs to an exe file from an unknown IP address. If you click it, it will install a virus or other malware on your system. To delete an email click the X right here.

Next is an email from the school's Human Resources department. If we hover over the link, we can see that it directs to a secure site on the EduNet web server. This one's legitimate.

This one claims to be from an online banking department. However, if we hover over this link, we see that it actually directs to an unknown IP address. This is a phishing attack. It wants to trick you into supplying your bank account information so the attacker can log into your account and steal your money.

This email claims to be a work report about changes to make to a website. However, if we hover over the link, we can see that it goes to edunet.ru, not edunet.com. It's also an exe file, which means it will install malware on your system. Next is an email that claims to be from human resources. If we read the message, it seems to contain useful information. It also doesn't contain any suspicious links or attachments. This message is legitimate.

This email is addressed to a seasoned executive. If we hover over the link, we see that it links to an aspx file, probably a virus, located on a server in Germany. This is an example of a whaling attack, which tries to trick high-level executives into handing over sensitive company data.

This email is from the Activities Committee. It has useful information, and it doesn't have any links or attachments. This one's legit.

Finally, this one's from Mia's friend Bob. While it's not particularly useful, it's also harmless. We'll leave it in the inbox.

10.2.13 Recognize Social Engineering Exploits 1 (Simulation) Scenario

Your roommate Mia has received several suspicious emails that she is not sure about. She has asked for your help to determine what to do with them.

In this lab, perform the following tasks:

• Read each email in her inbox and determine if it is legitimate.


• Delete any emails that appear to be phishing or whaling attacks.


• Keep any emails that are safe.


Hold your mouse over an embedded link to see the actual URL in the status bar at the bottom of the screen. The domain name for Mia's employer is EduNet.com .

Explanation

In this lab, you see the following emails. Select the check box to the left of malicious emails and click Delete to remove them.

Email Diagnosis Action Description


Online Banking Department Payment Pending Phishing

Delete

This is a carefully crafted attempt to get your bank account information. Hover over the link and notice that it does not direct you to the Credit Union website, but to an unknown IP address.


Human Resources Ethics Video Safe

Keep

While this email has an embedded link, it is digitally signed, so you know it actually comes from your Human Resources department. In addition, if you hover over the link, you see that it is a secure link to the EduNet web server.


Microsoft Windows Update Center New Service Pack Phishing

Delete

Notice the various spelling errors and that the link does not direct you to a Microsoft website.


Emily Smith Website Update Spear Phishing

Delete

While this email appears to come from a colleague, notice that the link points to an executable file from a Russian domain name. This is probably not something a real colleague would send. This file will likely infect the computer with malware.


Executive Recruiting Executive Jobs Whaling

Delete

Whaling attacks executives by using information that is tailored specifically to them. Clicking on the link could install malware that allows capture of sensitive company information.


Human Resources IMPORTANT NOTICE-Action Required Safe

Keep

While this email appears very urgent, it doesn't ask you to click on anything or run any attachments. It does inform you that you need to go to a website that you should already know and make sure your courses are complete.


Activities Committee Pumpkin Contest Safe

Keep

This email doesn't ask you to click on anything or run any attachments.


Robert Williams Presentation Safe

Keep

This email doesn't ask you to click on anything or run any attachments.


10.2.14 Recognize Social Engineering Exploits 2 (Demo Video) Transcript:

In this scenario, we'll look at the messages in an email inbox and identify which are social engineering exploits. We'll be looking specifically for possible hoaxes and malicious email attachments.

This first email claims to be from human resources at Mia's company. If we hover over the link, we can see that it leads to the edunet.com domain. This email is legitimate.

Next is an email from Grandma Jacklin. There are a few characteristics that make this stand out as an obvious hoax. It says to forward to everyone you know, and to distribute to as many people as possible. The subject line says "forward forward forward." It also has capitalized words throughout, which is very common among email hoaxes. Sorry Grandma. This next one is addressed to a generic Friend instead of to Mia by name. It also has a very vague message. Since this attachment is almost certainly malware, we'll delete it.

Here's another email from Grandma Jacklin. As a rule, any email that says "This is Real" in all caps is not real. This one's another hoax. Sorry Grandma.

This one claims to be from Joe and is even a reply to an email Mia sent earlier. However, it doesn't answer the simple

question, and adds an unrelated exe attachment. Since .exes in emails are bad news, we'll delete this one.

Next is an email that claims to be from human resources. If we read the message, it seems to contain useful information. It also doesn't contain any suspicious links or attachments. This email is legitimate.

This email is from the Activities Committee. It has useful information, and it doesn't have any links or attachments. This one's legit.

Finally, this one's from Mia's friend Bob. While it's not particularly useful, it's also harmless. We'll leave it in the inbox.

10.2.15 Recognize Social Engineering Exploits 2 (Simulation) Scenario

Your roommate Mia has received several suspicious emails that she is not sure about. She has asked for your help to determine what to do with them.

In this lab, perform the following tasks:

• Read each email in her inbox and determine if it is legitimate.


• Delete any emails that appear to be hoaxes.


• Delete any emails that appear to contain malicious attachments.


• Keep any emails that are safe.


Hold your mouse over an embedded link to see the actual URL in the status bar at the bottom of the screen. The domain name for Mia's employer is EduNet.com .

Explanation

In this lab, you see the following emails. Select the check box to the left of malicious emails and click Delete to remove them.

Email Diagnosis Action Description


Human Resources Ethics Video Safe

Keep

While this email has an embedded link, it is digitally signed, so you know it actually comes from your Human Resources department. In addition, if you hover over the link, you see that it is a secure link to the EduNet web server.


Grandma Jacklin FW: FW: FW: Virus Attack Warning Hoax

Delete

Any email that asks you to forward it to "everyone you know" is likely a hoax.


Joe Davis Re: Lunch Today? Malicious Attachment Delete

This email appears to be from a colleague. However, why would he fail to respond to your lunch question and send you a random attachment in return?


Grandma Jacklin Free Airline Tickets Hoax

Delete

Any email that asks you to forward it to "everyone you know" is likely a hoax, even if the contents promise you a prize. In addition, there is no way to know how many people the email has been forwarded to.

Sara Goodwin Wow!! Malicious Attachment Delete

Emails with attachments from random people who address you as, "Dear Friend" are likely not safe.


Human Resources IMPORTANT NOTICE-Action Required Safe

Keep

While this email appears very urgent, it doesn't ask you to click on anything or run any attachments. It does inform you that you need to go to a website that you should already know and make sure your courses are complete.


Activities Committee Pumpkin Contest Safe

Keep

This email doesn't ask you to click on anything or run any attachments.


Robert Williams Presentation Safe

Keep

This email doesn't ask you to click on anything or run any attachments.


10.2.16 Activity: Research Privacy Issues

In this activity, you will choose a current issue related to online privacy and then identify three different types of sources to help you understand the issue. Do the following:

1. Choose an online privacy issue that interests you. Possibilities include NSA data collection, social media privacy, and Big Data.


2. Use Google Scholar ( scholar.google.com ) to identify a scholarly or academic article on your chosen topic.


3. Perform online searches to identify a primary source related to your topic. Primary sources include original speeches, laws, and scientific fieldwork.


4. Perform online searches to identify a secondary source (one that is not an academic source) related to your topic. Secondary sources include online magazine articles, news articles, and books written for a popular audience.


5. Write a paragraph that summarizes the information you've gleaned from each of your three sources.


10.2.17 Section Quiz (Section Quiz) q_itf_confidentiality_eavesdropping

An IT administrator is informed by a security consultant that an attacker is capturing data being transmitted over the company network's wired connections.

Which of the following confidentiality concerns describes the security threat that is happening? Answers:

• Snooping


• Social engineering


• *Eavesdropping


• Pretexting

Explanation:

Eavesdropping uses programs such as packet sniffers to capture data being transmitted over a wired or wireless network. This is the confidentiality concern that the consultant is describing.

Snooping occurs when a person tries to secretively discover private information about a person, company, or other entity through methods such as using an administrative account to snoop on confidential employee files. This method does not involve capturing data over a wired network.

Social engineering attacks use deception to gain personal and/or private information for unlawful purposes. Attacks may be done in person, on the phone, in a browser window, or through an email message. This method does not involve capturing data over a wired network.

Pretexting attempts to trick a victim into revealing sensitive information under false pretenses. It does not involve capturing data over a wired network.

q_itf_confidentiality_encrypted

Which of the following is the MOST effective way to store confidential company information? Answers:

• *On a company network hard drive as encrypted data


• On a redundant or remote server


• On a company server with firewall software running


• On a cloud-based solution such as OneDrive


Explanation:

Confidential company information should always be stored on media (such as a hard drive) that can be secured with network access controls and data encryption.

While storing confidential company information on a redundant or remote server can help preserve the information if a major catastrophe were to happen, site redundancy does not necessarily guarantee secure network access controls and data encryption.

While a company server with a firewall installed can protect confidential company information from malicious internet attacks, it does not necessary provide network access controls or encrypt the confidential information.

While storing confidential company information on OneDrive can help restrict access to the information and provide some level of encryption, its primary purpose is to back up locally stored information. It does not provide the extensive network controls the company might need.

q_itf_confidentiality_facts_01

Which kind of online attack involves pretending to be a legitimate company to get sensitive information? Answers:

• *Phishing


• Virus


• Impersonating


• Spyware


Explanation:

Phishing attacks create real-looking webpages and forms to trick users into giving away their personal information. Viruses and spyware are malicious computer programs that either steal private information or infect your computer. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_confidentiality_facts_02

A user within your organization received an email relating how an account containing a large sum of money has been

frozen by the government of a small African nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account.

What type of attack occurred?

Answers:

• Piggybacking


• *Phishing


• Eavesdropping


• Man-in-the-Middle


Explanation:

A phishing attack has occurred in this scenario. This particular attack is sometimes referred to as a Nigerian 419 attack and is very common.

Piggybacking occurs when an unauthorized person follows behind an authorized person to enter a secured building or area within a building. Piggybacking is also sometimes called tailgating.

Eavesdropping refers to an unauthorized person listening to conversations of employees or other authorized personnel discussing sensitive topics.

A man-in-the-middle attack is a technological attack where a malicious person intercepts network communications between two hosts, posing as the sender to the receiver and as the receiver to the sender. q_itf_confidentiality_facts_03

Joe, a user, receives an email from a popular video streaming website urging him to renew his membership. The email appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe? Answers:

• *Phishing


• Man-in-the-middle


• Zero-day attack


• Trojan horse


Explanation:

Phishing is an attempt to trick a user into compromising personal information or downloading malware. Most often it involves an email containing a malicious attachment or hyperlink.

A man-in-the-middle (MITM) attack intercepts communications between two systems and alters the message before sending it on to the original recipient.

A zero-day attack is an exploit of an operating system or software vulnerability that is unknown and unpatched by the author.

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. q_itf_confidentiality_facts_04

What is the best countermeasure against social engineering? Answers:

• Acceptable use policy


• Strong passwords

• *User awareness training


• Access auditing


Explanation:

The best countermeasure to social engineering is user awareness training. If users understand the importance of security and the restrictions on types of information, they are less likely to reveal confidential information or perform unauthorized activities at the prompting of a stranger or a claimed identity over the phone. q_itf_confidentiality_facts_05

You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack.

Which of the following would you MOST likely recommend they do to mitigate the risk? Answers:

• Implement a border firewall to filter inbound network traffic.


• Establish a written security policy.


• Train managers to monitor user activity.


• *Teach users how to recognize and respond to social engineering attacks.


Explanation:

The best way to combat social engineering is to train users how to recognize and respond to social engineering attacks. For example, most organizations train employees to forward any calls or emails requesting a password or other network information to their help desk.

Filtering network traffic with a firewall fails to address the human element involved in social engineering. While a written security policy is a necessary measure, it will do little to defend your network if your users don't know how to recognize social engineering attempts. Management oversight is expensive and unlikely to detect a social engineering attempt until it is too late. Raising user awareness of the issue tends to be much more effective. q_itf_confidentiality_facts_06

Which of the following is a common form of social engineering attack? Answers:

• *Hoax virus information emails.


• Using a sniffer to capture network traffic.


• Stealing the key card of an employee and using that to enter a secured building.


• Distributing false information about your organization's financial status.


Explanation:

Hoax virus information emails are a form of social engineering attack. This type of attack preys on email recipients who are fearful and will believe most information if it is presented in a professional manner. All too often, the victims of these attacks fail to double check the information or instructions with a reputable third-party anti-virus software vendor before implementing the recommendations. Usually these hoax messages instruct the reader to delete key system files or download Trojan horses. Social engineering relies on the trusting nature of individuals to take an action or allow unauthorized action.

q_itf_confidentiality_facts_07

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Answers:

• Social engineering


• Fraggle attack


• *Phishing


• Session hijacking


Explanation:

Phishing tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well- known e-commerce site. Phishing is a specific form of social engineering. A fraggle attack uses spoofed UDP packets to flood a victim with echo requests using a bounce network, thus it is similar to Smurf. Session hijacking takes over a logon session from a legitimate client, thus impersonating the user and taking advantage of their established communication link.

q_itf_confidentiality_facts_08

Which of the following are examples of social engineering? (Select two.) Answers:

• *Shoulder surfing


• Port scanning


• *Dumpster diving


• War dialing


• Brute force password cracking


Explanation:

Social Engineering leverages human nature. Internal employees are often the target of trickery, and false trust can quickly lead to a serious breach of information security. Shoulder surfing and dumpster diving are examples of social engineering. Shoulder surfing is the act of looking over an authorized user's shoulder in hopes of obtaining an access code or credentials. Dumpster diving involves searching through trash or other discarded items to obtain credentials or information that may facilitate further attacks. These low-tech attack methods are often the first course of action that a hacker pursues.

Port scanning and war dialing are technical attacks that seek to take advantage of vulnerabilities in systems or networks. Brute force password cracking software tries to identify a password by trying every possible letter, number, and symbol combination until the correct one is found.

q_itf_confidentiality_facts_09

A user is unable to read their computer files. A pop-up explains that the files have been encrypted and gives instructions on how to purchase a decryption key. Which of the following BEST describes this malware?

Answers:

• *Ransomware


• Spyware


• Social engineering


• Trojan horse

Explanation:

Ransomware is a type of malicious software designed to block access to a computer system, often by encrypting files, until a sum of money is paid.

Spyware is malware that monitors a user's behavior without their knowledge. Spyware often secretly gathers information about a person or organization and relays this data to other parties.

Social engineering is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Ransomware may be introduced as a Trojan horse, but a Trojan horse does not always install ransomware. q_itf_confidentiality_facts_10

Maintaining confidentiality in the workplace is important for building and maintaining trust and for ensuring an open and honest communication between customers, clients, and employees. Which of the following threatens data confidentiality?

Answers:

• *Dumpster diving


• Man-in-the-Middle attacks


• Replay attacks


• Power outages


Explanation:

Dumpster diving involves searching through trash looking for discarded documents containing sensitive or confidential information.

A Man-in-the-Middle Attack is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other. This type of attack is a threat to data integrity.

A Replay Attack us an attempt to connect to a server by capturing and resending authentication information. It is also a threat to data integrity.

Power outages threaten data availability. q_itf_confidentiality_facts_11

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do? Answers:

• *Delete the email without opening the attachment.


• Forward the email to a friend and ask for advice.


• Reply to the sender and ask if the attachment is safe.


• Open the attachment because he has anti-virus software installed.


Explanation:

Mark should delete the email without opening the attachment. There are a variety of spelling errors, which wouldn't likely happen if the email were from a real software company. The attachment almost certainly contains malware that would install on Mark's system if he opened it. He should not forward or reply to the email. q_itf_confidentiality_facts_12

Jamie is a customer service representative with an office at company headquarters who often has confidential customer information displayed on her computer while editing customer accounts. When she leaves her office for a few minutes, she fails to make sure her computer screen is locked.

Which of the following is the MOST likely data confidentiality threat for the customer information on Jamie's computer?

Answers:

• *Snooping


• Social engineering


• Pretexting


• Reconnaissance


Explanation:

Snooping is a technique used to secretively discover private information about a person or company without hacking into a computer system. When Jamie leaves her office without locking her computer screen, another employee (or even guest) could slip into her office and gather confidential customer information before Jamie returns, which is a form of snooping.

Social engineering includes social techniques that use deception to gather personal and/or private information, such as through a phone call, a casual conversation, or a malicious email. In Jamie's situation, there is no social contact for the purpose of gathering confidential customer information.

Pretexting is a social engineering technique that attempts to trick a victim into revealing sensitive information under false pretenses, such as through a threat or a trust relationship (friendship, etc.). In Jamie's situation, there is no interaction with someone else that would be a threat or leveraging of a friendship.

Reconnaissance is a social engineering exploit that passively gathers information about a potential victim with techniques such as shoulder surfing or eavesdropping. In Jamie's situation, she is not present for these types of techniques to work. Snooping is still the most likely threat from leaving her unlocked computer unattended. q_itf_confidentiality_facts_13

You receive a call from a person who identifies himself as a technician at Microsoft. He says your computer is infected and needs to be cleaned. Which of the following is this phone call MOST likely an example of?

Answers:

• *Social engineering


• Snooping


• Eavesdropping


• Replay attack


Explanation:

Social engineering is the use of deception to gain personal and/or private information for unlawful purposes. Snooping is attempting to secretively discover private information about a person, company, or other entity. Eavesdropping involves overhearing a conversation to obtain sensitive information.

A replay attack is an attempt to connect to a server by capturing and resending authentication information. q_itf_confidentiality_facts_14

In addition to having a good backup that can restore files that have been encrypted as a result of a ransomware attack, which of the following is one of the BEST ways to avoid being threatened to pay a ransom?

Answers:

• *Protect confidential company information


• Keep all copyrights, patents, and trademarks up-to-date


• Refuse to pay any ransom


• Train employees on social engineering attacks

Explanation:

Protecting confidential company information by encryption will prevent a ransomware attacker from demanding a ransom to prevent them from releasing confidential company or personal information.

Keeping all copyrights, patents, and trademarks up to date provides legal protections but is not the best way to protect against ransomware.

Simply refusing to pay ransomware is a best practice, but it would not stop the attacker from releasing confidential company information.

Training and educating employees is a good step but will most likely not prevent the demand of ransomware if the attacker is threatening to release company confidential information in exchange for a ransom. q_itf_confidentiality_secure

Dana is an IT administrator who is working on a company-wide initiative to address confidentiality concerns about secure information being revealed to unauthorized individuals.

Which of the following would be topics on the team agenda? (Select two.) Answers:

• *Snooping


• Replay attack


• On-path attack


• Data destruction


• *Social engineering


Explanation:

Snooping and social engineering are both ways in which confidential information could be revealed to unauthorized individuals. Snooping is when a person tries to secretively discover private information. Social engineering attacks use deception to gain personal and/or private information for unlawful purposes.

In a replay attack, a hacker sniffs packets between a client and a server in hopes of catching authentication information. This is an example of data integrity concerns, not confidentiality concerns.

An on-path (man-in-the-middle) attack is a real-time attack on a live network connection. On-path attacks are commonly used to steal information such as credit cards and online bank credentials. They represent integrity concerns, not confidentiality concerns.

Data destruction can occur for malicious or accidental reasons (such as natural disasters or acts of terrorism) and is an availability concern, not a confidentiality concern.

q_itf_confidentiality_social

Social engineering attacks use deception to gain personal and/or private information. Which of the following are examples of social engineering techniques? (Select three.)

Answers:

• *Shoulder surfing


• Eavesdropping


• Snooping


• *Dumpster diving


• *Familiarity


• Pharming


Explanation:

Shoulder surfing is a social engineering technique that involves looking over a user's shoulder, looking for sensitive information displayed on the screen or even watching keystrokes being typed on a keyboard.

Dumpster diving is a social engineering technique that involves searching through trash looking for discarded documents containing sensitive information.

Familiarity is a social engineering technique that uses the premise of a supposed friendship to convince you to do something that you should not, such as provide sensitive information.

Eavesdropping uses programs such as packet sniffers to capture data being transmitted over a network. It does not involve social connection or contact.

Snooping occurs when a person tries to secretively discover private information about a person, company, or other entity. It does not involve any social connection or contact.

Pharming redirects web traffic sent to a legitimate site to a malicious site that looks identical to the real website. The idea is to trick users into supplying sensitive information. However, it does not involve any social connection or contact. q_itf_integrity_concern

Janet is a systems engineer who is helping to design and implement a secure network for a new company. She wants to make sure critical data is protected from unauthorized changes during and after transmission.

Which of the following BEST describes Janet's concerns about making sure the critical data arrives intact and unaltered at its intended location on the network?

Answers:

• *Integrity concerns


• Confidentiality concerns


• Availability concerns


• Social engineering concerns


Explanation:

Integrity concerns involve the need for data security professionals to ensure data integrity, making sure it arrives intact and unaltered on a network. Integrity describes Janet's concerns about critical data.

Confidentiality concerns involve protecting confidential information, such as usernames, passwords, and bank account numbers. However, Janet is concerned about data integrity, which means that the data is not changed when it is transmitted over the network.

Availability concerns involve the availability of important company information, which can involve concerns such as a power outage or hardware failure, but not the integrity of transmitted data.

Social engineering concerns involve attacks (such as fake emails) that can be used to steal information from a user. However, Janet is concerned about data integrity, which means that the data is not changed when it is transmitted over the network.

q_itf_integrity_facts_01

Which of the following describes a Man-in-the-Middle attack? Answers:

• A person over the phone convinces an employee to reveal their logon credentials.


• *An attacker intercepts communications between two network hosts by impersonating each host.


• An IP packet is constructed which is larger than the valid size.


• Malicious code is planted on a system where it waits for a triggering event before activating.


Explanation:

A Man-in-the-Middle attack is a technological attack where a malicious person intercepts network communications between two hosts, posing as the sender to the receiver and as the receiver to the sender.

Convincing an employee to reveal his logon credentials over the phone is an example of a social engineering attack.

Constructing an IP packet which is larger than the valid size is a form of denial-of-service attack. Planting malicious code on a system where it waits for a triggering event before activating is a logic bomb.

q_itf_integrity_facts_02

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for? Answers:

• *Power outage


• Data redundancy


• Denial-of-service


• Wiretapping


Explanation:

Critical systems such as database servers and web servers need to be equipped with a UPS, or uninterruptible power supply. These devices provide a temporary power source during an outage that gives the system enough time to shut down cleanly without data loss or corruption.

Data redundancy is a method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.

A denial-of-service attack attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

Wiretapping is a form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.

q_itf_integrity_facts_03

You recently charged $70 to one of your bank accounts, but the amount now appears as $700. Which of the following may have occurred?

Answers:

• *Man-in-the-middle attack


• Impersonation


• Denial-of-service attack


• Brute force password attack


Explanation:

A man-in-the-middle attack is a real-time attack on a live network connection. Let's say we have a client and a server that are communicating with each other. During a man-in-the-middle attack, a hacker intercepts the communication stream between these two. Simultaneously, the hacker's computer tricks the client into thinking it's the server and tricks the server into thinking it's the client. The hacker can then intercept and modify the data in transit. With the right software and the right vulnerabilities, this attack is quite easy to perform. Man-in-the-middle attacks are commonly used to steal credit cards, online bank credentials, and confidential personal and business information.

Impersonation includes TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.

A denial-of-service attack is an attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

q_itf_integrity_impersonation

Which of the following are examples of impersonation social engineering tactics? (Select two.) Answers:

• A hacker intercepts the communication between a client and server.


• A hacker sniffs the packets between a client and server to capture authentication information.

• *A hacker pretends to be a member of senior management to gain access to a system.


• A hacker gains access to a system to steal or change confidential information.


• *A hacker uses TCP session hijacking to trick a server.


Explanation:

Impersonation can refer to a social engineering tactic where a hacker pretends to be a member of senior management who has authorized access to a system.

Impersonation can also involve a hacking technique that uses TCP session hijacking to trick a server by pretending to be a client.

Intercepting communication between a client and server is an example of an on-path (man-in-the-middle) attack, not impersonation.

Sniffing packets between a client and server to capture authentication information is a replay attack, not impersonation. Stealing or changing confidential information in a system is an indication of unauthorized changes, not impersonation. q_itf_integrity_malware

Which of the following do cybercriminals frequently use to alter or compromise data integrity? Answers:

• *Malware attack


• TCP session hijacking


• Replay attack


• On-path attack


Explanation:

Cybercriminals often launch destructive malware attacks that compromise data integrity and disrupt communication networks.

TCP session hijacking tricks a server by pretending to be a client. However, this technique is not specifically used to alter or compromise data.

In a replay attack, a cybercriminal sniffs the packets between a client and server in hopes of catching authentication information. This process does not alter or compromise data integrity.

During an on-path (man-in-the-middle) attack, a cybercriminal intercepts the communication stream between a client and server to capture critical data, but they do not use the attack to alter or compromise data integrity. q_itf_availability_dos

A systems engineer has discovered an attack on the network, which is threatening to shut down a web service by overloading it with bogus requests. The attacker is using bot malware to enlist compromised systems (called zombies) to remotely manipulate them.

Which of the following is the threat being utilized by the attacker? Answers:

• *Distributed denial-of-service attack


• Data destruction


• Service outage


• Replay attack


Explanation:

In a distributed denial-of-service (DDoS) attack, the attacker uses bot malware to enlist multiple systems to increase the

magnitude of the attack. The compromised systems, called zombies, are infected with malware that allows them to be remotely manipulated by the attacker.

Data destruction refers to the disposal and destruction of sensitive data on a storage device. It can also refer to incidents such as natural disasters or acts of terrorism, which can also destroy data on a storage device. Data destruction does not involve an attack to bring down a network's web services.

Service outage normally refers to a cloud-hosted solution that is temporarily down. The downtime could be caused by several factors, including a denial-of-service attack. However, in this scenario, the systems engineer is dealing with an attack on a local network.

In a replay attack, a hacker sniffs packets between a client and server in hopes of catching authentication information. This type of attack does not overload a network with bogus requests that can threaten web service availability. q_itf_availability_facts_01

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks.

Which of the following does this security threat describe? Answers:

• *Zombie/botnet


• Phishing


• Man-in-the-middle


• Spoofing


Explanation:

Devices that are infected with malware that can be remotely controlled by an attacker are known as zombies. A collection of these zombies that are controlled by the same attacker are known as a botnet (robot network).

Phishing is an attempt to trick a user into compromising personal information or downloading malware. Most often it involves an email containing a malicious attachment or hyperlink.

A man-in-the-middle (MITM) attack intercepts communications between two systems and alters the message before sending it on to the original recipient.

Spoofing is when an entity misrepresents itself by using a fake IP address or, more commonly, a fake email address that resembles a real address. The person being spoofed may not immediately discover that the address is fake. q_itf_availability_facts_02

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.

As a first responder, which of the following is the next BEST step to perform? Answers:

• Hire a forensic team to gather evidence.


• Investigate how the attack occurred.


• *Contain the problem.


• Prevent such an incident from occurring again.


Explanation:

You have already identified the issue, so the next step is to take actions to stop the attack and contain the damage. Although it is important to preserve as much information as possible to assist in later investigations, it might be better to stop the attack, even if doing so alerts the attacker or results in the loss of evidence regarding the attack. q_itf_privacyInternet_aup

Human Resources and IT are looking for ways to minimize inappropriate internet usage at work without significantly increasing company costs. Which of the following actions would MOST closely meet the Human Resource and IT requirements?

Answers:

• *Update the acceptable use policy and have employees agree to follow the policy guidelines.


• Prevent employees from using personal computing devices at work.


• Block all access to social networking platforms.


• Update the security assurance policies to more closely monitor employees.


Explanation:

Because inappropriate computer use can be a huge liability for a company, most companies require employees to agree to an acceptable use policy (AUP) or a fair use policy.

Personal computing devices include smart phones, tablets, and any other device connected to the network. These devices are often vital to business processes and tasks, and it would be difficult or expense to replace them with company- purchased and regulated devices.

Social networking platforms (such as Facebook) have become an inexpensive and vital means to communicate with the public and customers. Blocking these platforms could significantly impact business revenue and result in much higher costs for communicating in more commercial venues.

Security assurance polices monitor the type of data employees are sending to ensure that they are not divulging any confidential information or are compromising security. These policies do not impact general internet usage habits. q_itf_privacyInternet_facts_01

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.)

Answers:

• *Keep the operating system up to date


• *Lock the screen with some form of authentication


• Keep an up-to-date remote backup


• Avoid anti-virus apps


• Keep your device always in your possession


• Turn off location services


Explanation:

Keeping the operating systems up to date with the latest updates and patches will help because they often contain fixes for known security issues. Configure the screen lock to require some sort of authentication to physically access your device.

A remote backup is an essential disaster recovery solution but will not prevent hacker exploitation or virus infection. Having your device always in your possession, it can still be hacked and infected by a virus if not protected. Anti-virus apps for Android devices will protect your device, but you should do some research to make sure you get the most effective one. Turning off locations services does not improve your device's security and it will make it harder to find your device if you lose it.

q_itf_privacyInternet_facts_02

Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select all that apply.)

Answers:

• *Remote wipe


• *Locator applications


• *A screen lock


• Remote backup


• Anti-malware software


• Keeping up to date with OS updates and patches


Explanation:

Being able to do a remote wipe of your device will keep sensitive information from falling into the wrong hands if your mobile device is lost or stolen. Having a screen lock will help keep casual users from getting access to your device, but determined hackers can find ways around a screen lock. Locator applications might help you find your device before a determined hacker does, if you misplace it.

Keeping the operating systems up to date with the latest updates and patches will not protect your device if it falls into a determined hacker's possession. A remote backup is an essential disaster recovery solution but will not prevent hacker exploitation or virus infection. Being up to date and having anti-malware apps, for Android devices, will not protect your device in a determined hacker's possession.

q_itf_privacyInternet_facts_03

In which of the following situations should you expect total privacy? Answers:

• *Financial transactions


• Email messages and attachments


• Social networking


• Instant messaging


Explanation:

Entering personal information or conducting financial transactions online is convenient and efficient. There is an expectation of privacy offered by the financial institution. However, consumers need to adopt safeguards to protect themselves against identity theft and fraud.

Email, social networking, and instant messaging are often free or employer provided services and have specific expectations that communication in many situations is not private. For example, a free email provider may scan your email and attachments to send you targeted ads.

q_itf_privacyInternet_facts_04

In which of the following should you expect some privacy? Answers:

• *Personally identifiable information entered into a human resource database


• Metadata stored by a web browser


• Emailing an important document to a friend using an employer email system


• Sharing a photo through a mobile phone app

Explanation:

A person should have an expectation of some privacy for any PII entered into a database.

Metadata is typically used by third parties for marketing and sales use, such as when you visit a vendor's website. Metadata will be stored on your computer that identifies you the next time you visit a web site, and targeted ads may be displayed based on your previous searches or interactions.

There is no expectation of privacy for employer-based email systems and all data transmitted is considered business related.

Sharing a photo through a mobile phone app, such as an instant messenger, does not typically provide an expectation of privacy but depends on the privacy statement from the application vendor.

q_itf_privacyInternet_handbook

Nora is a new employee in an international trading company. She works at company headquarters, which requires a security badge to enter the building. She sometimes sees individuals in the building who are not wearing a security badge.

Which of the following is the MOST effective way to find out if this is an official, acceptable behavior? Answers:

• *Refer to the employee handbook for guidelines on wearing badges.


• Find a video on the internet that covers wearing security badges.


• Consult with another employee about wearing security badges.


• Refer to any training materials that were available during new hire orientation.


Explanation:

It's important for a company to create documentation (often in an employee handbook) that outlines specific rules of behavior and covers a wide range of topics, including the wearing of company badges for employees and guests.

While an internet video might cover widely accepted policies for wearing security badges, it will not contain specific guidelines for Nora's company.

While another employee might know something about wearing security badges, the employee may not be educated in the latest policies available in the handbook.

The new hire training materials might not completely cover all policies dealing with wearing badges at company headquarters.

q_itf_privacyInternet_metadata

Which of the following BEST describes valuable data about your web browsing habits extracted by companies such as Facebook and Instagram for advertising purposes?

Answers:

• *Metadata


• Personally identifiable information (PII)


• Private email


• Secure transactions


Explanation:

Companies such as Facebook, Instagram, and Gmail make profits by extracting metadata from information they process on your behalf. These companies analyze this data and use it for marketing and advertising. They can also sell their metadata to other companies.

Personally identifiable information (PII) is information often used to confirm your identity, either by phone or over the internet. It can include a social security number, bank account number, or PIN to an account. Metadata includes browsing information, such as where and when you use a service and which sites you visit. It does not include PII. Companies such as Facebook and Instagram can monitor your communications for valuable metadata. However, the

company where you are employed has the right to monitor any communications made through the company network, including private email.

Secure transactions refer to entering personal information or conducting financial transactions online. This information is protected and secured, and it is illegal to use for advertising unless authorized by the person providing the information. q_itf_privacyInternet_operations

Personnel management policies provided by Human Resources contribute significantly to security in a company. Which of the following is the personnel management policy type that communicates the importance of security to employees? Answers:

• Termination


• Recruitment


• *Operation


• Security standards


Explanation:

Operation policies emphasize training programs and are provided by Human Resources to communicate the importance of security to current employees.

Termination policies help guide Human Resources and managers through the process of separating, firing, or retiring company employees. They often include security measures to protect the company. They do not focus on training employees about security policies.

Recruitment policies help guide Human Resources and managers through the hiring process. They often include candidate screening and background checks. They do not focus on training employees about security policies.

A security standard is a measurement by which others can evaluate adherence to security policies. It is not the process of training employees on the importance of security.

q_itf_privacyInternet_private

You are using your smartphone at work during a break to send personal email and social network messages. You are using the company-provided Wi-Fi to connect to the internet.

Which of the following is the level of privacy you can expect from your company when you send private communications through the company network?

Answers:

• Private emails and messages are ignored by the company.


• *Private emails and messages may be stored and monitored.


• Private emails and messages are filtered so that only business-related personnel communications are stored and monitored.


• Private emails and messages are stored but deleted on a regular basis.


Explanation:

Any communications made through a company's network, including private email, may be stored and monitored. Therefore, employees should exercise judgment and caution when using company computers for personal use, even when such use is allowed by the acceptable use policy.

Private emails and messages sent through the company network are normally stored and monitored (not ignored). Private emails and messages sent through the company network are normally stored and monitored without any initial filtering.

While private emails and messages might be deleted on a regular basis, they can also be monitored for any acceptable use policy violations.

q_itf_privacyInternet_training

Your company is having issues with employees who write down their passwords on sticky notes, paper notepads, and

other types of paper. Even though they're often hidden in drawers or behind computer equipment, it is still a high security risk for the company.

As the managing IT administrator for your company, what is the BEST solution to reduce or eliminate this issue? Answers:

• Physically monitor the employees with a CCTV system.


• Update the acceptable use policy (AUP).


• *Work with Human Resources to provide security training.


• Provide employees with training on how to create strong passwords.


Explanation:

Human Resources is responsible to create (or implement) training programs that communicate security policies to employees. Security training has always had the most significant impact on issues, such as writing down passwords. While monitoring employees with a Closed-Circuit Television (CCTV) system could catch some employees writing down passwords, it would be an expensive and time-consuming process and not as effective as simply training employees.

Acceptable use policies focus on internet usage behaviors, which do not normally include behaviors such as writing down passwords for future reference. And updating a policy is not as effective as providing employee security training. Employee training on how to create strong passwords does not address the issue of writing down passwords. In fact, the stronger and more complex the issue, the more likely employees will continue to write down passwords for future use. q_itf_privacyInternet_usage

A federal government agency is working on updating their employee handbook to specifically cover employee internet usage.

Which of the following are topics that should be covered under this section in the handbook? (Select three.) Answers:

• *Social media and email


• Personally identifiable information (PII)


• Personnel management policies


• *Workplace surveillance


• Data destruction


• Impersonation


• *Data protection


Explanation:

Social media, email, instant messaging, and file sharing services generally have policies in an employee handbook that let users decide what information should be available to which people.

Workplace surveillance includes physical monitoring, security assurance, and monitoring data, all of which can be clearly outlined in an employee handbook.

Data protection includes policies such as locking your screen while away from your computer and installing a locator app to help you find your device if it is misplaced. All of these can be included in an employee handbook.

Personally identifiable information (PII) is sensitive, personal information (such as a social security number) that should never be included in an employee handbook.

Personnel management policies are used by Human Resources as a guide for hiring, operations, and termination of employees. These policies are generally not included under an internet topic in an employee handbook.

Data destruction focuses on the disposal and destruction of sensitive data stored on older equipment or the destruction of data for malicious or accidental reasons. These types of policies and guidelines are normally not included in an employee handbook.

Impersonation refers to a social engineering tactic where a hacker pretends to be a member of senior management. This is not usually included in an employee handbook.

q_itf2_identitytheft_check

Using an administrator account, a company employee copies the personally identifiable information (PII) for several other employees. Using that information, the employee then opens up several credit card accounts to purchase expensive electronic equipment for personal use.

Which of the following could have helped prevent the employee from opening up the credit card accounts? Answers:

• *Identity checks


• Identity fraud


• Identity theft


• Suspicious charges


Explanation:

To protect from identity fraud, companies should always use as many means as possible to perform identity checks. These ensure that the person setting up an account is really who they say they are.

Identity fraud describes the use of the stolen PII for opening credit card accounts. It would not have prevented the opening of the accounts.

Identity theft describes the process the employee used to steal the PII. It would not have prevented the opening of the credit card accounts.

Sometimes, a company may contact you to confirm whether a suspicious charge was really made by you. However, this identity theft protection service would not have prevented the employee from opening up the credit card accounts. q_itf2_identitytheft_pii

As a systems administrator, you've received a Help ticket from an employee who wants to reset their password for the company's intranet site. Security policy requires that you confirm the employee's identity through a telephone call.

Which type of security information could help you confirm the employee's identity over the phone? Answers:

• Biometrics


• *Personally identifiable information (PII)


• Software token


• MAC address


Explanation:

Personally identifiable information is often used to confirm your identity, either by phone or over the internet. It can include your full name, Social Security number, or driver's license number.

Biometrics involves using scanners to measure unique aspects of your physical body, such as fingerprints, handprints, retinal patterns, or facial recognition. However, this can be difficult (or impossible) to capture during a phone call. PII is much easier to request.

Software tokens are stored on a general-purpose electronic device, such as a desktop computer or cellphone, and require a two-factored authentication process, which normally begins with entering a username and password. This method is not designed to be part of a phone call.

A MAC address is a media access control address that's assigned to a NIC card for use in communicating over a network. It does not confirm your identity.

10.3 Authentication Section Introduction

As you study this section, keep the following questions in mind:

• How do authentication, authorization, and accounting work together?


• How can I make my own passwords more secure?


• Do I use any type 1 authentication factors? Type 2? Type 3?


After finishing this section, you should be able to:

• Explain the importance of the authentication, authorization, and accounting framework.


• Describe the most common authentication types and when to use them.


• Explain the purpose of multifactor authentication.


• Describe various models for creating and maintaining access control lists.


• Explain why access control frameworks need to keep track of who gains access to the system.


• Set a secure passcode on an iPad.


• Configure an iPad to erase data after 10 failed passcode attempts.


• Create a local Windows account for a user who already has a Microsoft login.


• Create a non-Microsoft user account on a Windows system.


Key terms for this section include the following:

Term Definition


Type 1 Authentication

A type of authentication that requires the user to provide something that they know, such as a password or PIN.


Type 2 Authentication

A type of authentication that requires the user to provide something that they have, such as a key fob, electronic chip, or smart card.


Type 3 Authentication

A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.


Multifactor Authentication

Authentication that requires two or more evidences of authentication, usually of different types.


Single Sign-on

A method of authenticating with one system to gain access to other related systems.


Discretionary Access Control (DAC)

A type of access control where a user has complete control over a resource, and also determines the permissions other

users have to those resources.


Role-based Access Control (RBAC)

A type of access control that restricts access based on the user's role in an organization.


Mandatory Access Control (MAC)

A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy, and users aren't able to override the policy.


Accounting

The process of keeping track of user activity while attached to a system.


Logging

The capturing and storing of computer and user events.


Non-repudiation

The ability to ensure that someone can't deny that they performed a certain act.


10.3.1 Authentication (Lesson Video) Transcript:

One of the most important ways to keep a computer or network secure is to control who can access it and what they're allowed to do. A successful access control framework is made of three parts: authentication, authorization, and accounting.

In this video, we'll discuss the first part of the "triple a" framework: authentication. At its most basic level, authentication is proving that you are who you say you are. When you pick up a prescription and show your driver's license, you're authenticating yourself to the pharmacist. In this video, we'll discuss several factors, or methods, that can be used to authenticate a person to a computer or network. Each of these factors falls under one of three types: type 1, which is something you know; type 2, which is something you have; and type 3, which is something you are.

Type 1 authentication, which is something you know, is by far the most common. If you're watching this video, you've already used type 1 authentication today when you logged into your TestOut account. Because you know the secret password associated with this account, we can be reasonably sure you are who you claim to be. Other kinds of type 1 authentication are Personal Identification Numbers, or PINs, single-use passwords, and answers to security questions, such as the street you grew up on or the name of your first pet. Many smart phones have their owners authenticate by drawing a specific pattern on the screen. Type 1 authentication is cheap and easy to implement. The downside is that it's also easy to dupe. If someone else learns your password or PIN, they can easily authenticate into your accounts and pretend to be you.

Incidentally, if you accessed this video by stealing someone else's TestOut password, you should check out our video on ethics right after this one.

Type 2 authentication is something you have. Examples of type 2 factors are keys, fobs, electronic chips, and smart cards. Another factor that technically falls under type 2 is your physical location. For example, you may set your smartphone to unlock automatically if it's inside your home. Type 2 authentication is more secure than type 1 because a ne'er-do-well would need to physically steal or copy your authentication token to impersonate you. The downside is that it's harder and more expensive to implement.

Type 3 authentication is something you are. Computers can use biometric scanners to measure unique aspects of your physical body, such as your fingerprints, handprints, retinal patterns, face, or voice. If you have a fingerprint scanner on your phone, that's type 3. Type 3 authentication is the most expensive to implement and the hardest to dupe, which is why it's been a mainstay of espionage thrillers for several decades.

Systems and accounts that need extra security often require multifactor authentication, generally from two or more types. This simply means you have to authenticate yourself two or more times to gain access to a system. A common example

is to require a type 1 password and a type 2 smart card.

Finally, let's talk about single sign-on, which is where logging into one system gives access to other related systems. A common example of single sign-on is Google services. By authenticating one time, you gain access to your Gmail, YouTube, and Google Drive accounts.

In this video, we discussed authentication. We learned about three types of authentication factors: type 1, which is something you know; type 2, which is something you have; and type 3, which is something you are. We also talked about multifactor authentication and single sign-on.

10.3.2 Authentication Facts

One of the most important ways to keep a computer or network secure is to control who can access it and what they're allowed to do. A successful access control framework is made of three parts: authentication, authorization, and accounting.

This lesson covers the topic of authentication. Authentication

At its most basic level, authentication is the process of proving you are who you say you are. The following table discusses several factors, or methods, that can be used to authenticate a person to a computer or network.

Table 1: Authentication Factor/Method Description


Type 1 authentication

Type 1 authentication is something you know. It is the most common authentication type. If you're reading this lesson, you used type 1 authentication when you logged into the TestOut account. When you enter an account password, the system can be reasonably sure you are who you claim to be. Other kinds of type 1 authentication are:

• Personal identification numbers (PINs)—single-use passwords, and answers to security questions. This kind of information is known as personally identifiable information (PII).


• Passphrase—some programs require a group of words, rather than a single-word password. This adds complexity to the authentication. Therefore, it is more secure than a password.


• Pattern lock—many smart phones have the user authenticate by drawing a specific pattern on the screen.


Type 1 authentication is cheap and easy to implement. The downside is that it's also easy to dupe. If the password, passphrase, pattern, etc., is compromised, someone can easily authenticate into the account.


Type 2 authentication

Type 2 authentication is something you have. Examples of type 2 factors are:

• Keys.


• Hardware tokens such as fmaobs, electronic chips, and smart cards.


• Physical location. For example, you can set your smartphone to unlock automatically if it's inside your home.


• Software tokens. Software tokens are typically used as part of a two-factored authentication process. o Software tokens are stored on a device such as a desktop computer, laptop, PDA, or cell phone and can be duplicated. Typically, when accessing a system that uses software tokens, you enter your user name and password. Then, you enter the soft token that is sent to you in a text message or email.


o An app can also be installed on a device such as your cell phone. The app constantly sends soft tokens that are timed with the system you are trying to connect to.

Factor/Method Description


• One time password (OTP). This is a password that is generated, sent, and used for only one session. It is a randomly generated value. It eliminates the password being guessed, cracked or discovered. The risk is that these OTPs are vulnerable to interception.


Type 2 authentication is more secure than type 1. Someone would need to physically steal or copy your authentication token to impersonate you. The downside is that it's more difficult and expensive to implement.


Type 3 authentication

Type 3 authentication is something you are. Computers can use biometric scanners to measure unique aspects of your physical body, such as your fingerprints, handprints, retinal patterns, face, or voice. If you have a fingerprint scanner on your phone, that's type 3. Type 3 authentication is the most expensive authentication type to implement and the hardest to dupe.


Multifactor authentication

Systems and accounts that need extra security often require multifactor authentication, generally from two or more types. This means you must authenticate yourself two or more times to gain access to a system. A common example is to require a type 1 password and a type 2 smart card.


Single sign-on

Single sign-on (SSO) is a method that allows you to log into one system and have access to other related systems. A common example of SSO is Google services. By authenticating one time, you gain access to your Gmail, YouTube, and Google Drive accounts.


10.3.3 Authorization (Lesson Video) Transcript:

Authorization is the process of deciding what a user can do once they've authenticated. Can this user make changes to system configuration files? Can they create new files and delete old ones? Or are they only allowed to view files? These permissions are kept on an ACL, or access control list. There are a few different models a system can use to create and maintain an access control list. We'll discuss a few of them here.

First is discretionary access control, or DAC. This model emphasizes the importance of the owner, or creator, of a resource. Under DAC, the owner is the only one with full access rights to the resource, and it's up to them to modify the ACL to allow others to view, edit, or copy. Google Docs is a common example of the DAC model. Whoever creates a document is the owner, and they can choose how and with whom to share it. They can also transfer ownership to another user.

The next two models we'll look at are rule-based control systems. This means that they modify the ACL based on pre- configured rules, as opposed to discretionary systems where a single user can grant or revoke privileges at will.

Role-based access control systems grant different permissions to different kinds of users based on their user role. Let's use this course as an example. As a student user, you have permission to view course resources, such as this video. You also have permission to view your own gradebook. However, you don't have permission to view your classmates' grades or make direct changes to the gradebook. Teachers have all the same permissions as students, plus the ability to view and edit all student grades in their classes. However, they can't access grades for other teachers' classes. Administrators can view and edit the grades for every student at the school, regardless of who their teacher is. In each case, the user's permissions are determined by their role.

Mandatory access control uses security clearance levels to decide which users can access which resources. Each object in a system is given a numeric clearance level, as is each user. The more sensitive the data, the higher its level. To access a given resource on the system, a user must have a clearance level equal to or higher than the level of the resource.

Mandatory access control is often used by governments and militaries.

In this video, we learned about authorization. We looked at three models for writing and maintaining access control lists: discretionary access control, role-based access control, and mandatory access control.

10.3.4 Authorization Facts

Authorization is the process of specifying the actions a user can perform once they've authenticated. The actions can range from making changes to system configuration files, to deleting files, to only viewing files. These allowed actions (permissions) are assigned in an access control list (ACL).

This lesson covers the topic of authentication. Authorization

When assigning permissions, keep in mind:

• The principle of least privilege states that users are given only the access they need to do their specific tasks. It is best practice to use the principle of least privilege when creating ACLs and policies.


• An implicit deny rule denies access to any user who does not have explicit authorization granted.


There are a few models you can use to create and maintain an ACL. The table below describes several of these models. Table 1: Authorization

Term Description


Discretionary

Emphasizes the importance of the owner (creator) of a resource. The owner:


Role

Modifies the ACL based on pre


Mandatory access

Uses security clearance levels to specify the users who can access designated

10.3.5 Accounting (Lesson Video) Transcript:

In an access control framework, accounting means keeping track of who does what on a computer or network. If something goes wrong, it's important to find out who was signed in, what files they accessed, and how they used their permissions. This information is vital to troubleshooting the problem and preventing it from happening in the future. It's also vital to security. If a malicious user gains access to the system, proper accounting will let administrators know how they gained access and what exactly they did, then take steps to prevent further harm.

At its core, accounting is simply the logging of events. To understand this, we need to understand two terms: events and logging. An event can be just about anything that happens on a computer – a user signing in or signing out, accessing or modifying a file, and visiting a website are all commonly used as accounting events. Logging is keeping a detailed list of each event. For example, whenever a user signs into a computer, the log will record the user's name, which computer they accessed, the date and time of the login, and how long they stayed signed in. Logging is also felling trees and preparing timber, but that's not important right now.

Another important accounting concept is non-repudiation. If someone is caught trespassing on a network or stealing data, they're probably going to say it wasn't them. Non-repudiation is taking measures to prove that it most definitely was. One of the most common non-repudiation techniques is to set up surveillance cameras – it's hard to deny you committed a crime when a video recording shows you in the act. Another non-repudiation measure is to implement strong authentication protocols. Because type 3 biometric factors like fingerprints and retinal scans are hard to duplicate, they provide strong evidence that an account was being used by its proper owner and not by an intruder.

In this video, we learned about two important accounting concepts: logging and non-repudiation.

10.3.6 Accounting Facts

In an access control framework, accounting means keeping track of who does what on a computer or network. If something goes wrong, it's important to find out who was signed in, what files were accessed, and how permissions were used. This information is vital to troubleshooting the problem and preventing it from happening in the future. It's also vital to security.

If a malicious person gains access to the system, proper accounting will let administrators know how the person gained access, what exactly the person did, and how to take steps to prevent further harm. The following table describes two concepts that enable proper accounting within an information system.

Table 1: Accounting CONCEPT DESCRIPTION


Logging

At its core, accounting is simply the logging of events. To understand this, you must understand two terms: events and logging. An event can be just about anything that happens on a computer. A user signing in or signing out; accessing or modifying a file; and visiting a website are all commonly used as accounting events. Logging is keeping a detailed list of each event. For example, whenever a user signs into a computer, the log will record the user's name, the computer the user accessed, the date and time of the login, and how long the user stayed signed in. Another example is the log of websites visited by the user in the web browser's history tab.


Non-repudiation

If someone is caught trespassing on a network or stealing data, the person will probably deny it. Non-repudiation is taking measures to verify the identity of someone performing an action. One of the most common non-repudiation techniques is to set up surveillance cameras. Video is commonly used for identification. Another non-repudiation measure is to implement strong authentication protocols. Because type 3 biometric factors such as fingerprints and retinal scans are hard to duplicate, they provide strong evidence that an account was being used by its proper owner and not by another person. Two more examples are signatures and receipts. Having a physical or even a digital signature can provide proof that someone created a file or approved an action or document. A receipt for a product or a service can provide proof that a person was intentionally involved in the transaction.

10.3.7 Create a User Account (Demo Video) Transcript:

In this scenario, you'll create a local user account on a Windows machine. Right-click Start, then click Settings. Click Accounts. From the left pane, click Other users. Click Add someone else to this PC. In the User name box, type Libby. In the password fields, carefully type the password. Remember that passwords are case sensitive.

Next, we'll enter security questions. If you forget your password, you can use the security questions to authenticate yourself, then set a new password. For security question 1, select What was your first pet's name? and set the answer to Hiccup. For question 2, select What's the name of the city where you were born? and set the answer to Salem. For question 3, select What's the name of the city where your parents met? and set the answer to Lexington. When you're finished, click Next.

10.3.8 Create a User Account (Simulation) Scenario

Libby has been hired by your organization. She will be using the computer named Office1, and she needs a local account.

In this lab, your task is to create Libby's local user account using the Windows Setting application. While creating the new account, use the following information:

• User information: o Username: Libby o Password: tempP@ss#


• Security questions:



Security Question Answer


1. What was your first pet's name? Hiccup


2. What's the name of the city where you were born? Salem


3. What's the name of the city where your parents met? Lexington


Explanation

Complete this lab as follows:

1. Right-click Start and then select Settings .


2. Select Accounts .


3. From the left pane, select Other users .

4. Select Add someone else to this PC .


5. Under Who's going to use this PC , enter Libby .


6. Under Make it secure , enter the following password information: o Password: tempP@ss# o Re-enter password: tempP@ss#


7. Under In case you forget your password , select and complete the following security information:


Security Question Answer


1. What was your first pet's name? Hiccup


2. What's the name of the city where you were born? Salem


3. What's the name of the city where your parents met? Lexington


8. Select Next .


10.3.9 Configure iPad Access Control and Authentication (Demo Video) Transcript:

In this lab, you'll configure a password on an iPad. Securing your mobile devices is an excellent idea because if someone were to steal your device, they'd have a much harder time accessing your private data. We'll use the mouse in the lab, but on a real iPad you'd use your finger.

To start, click Settings. From the left menu, click Touch ID & Passcode. Enter 1542. Click Require Passcode. Select After 15 minutes. At the top, click Passcode Lock to go back to the previous menu. Turn off the switch next to Simple Passcode. Ironically, enter 1542 one last time. Click into the text entry box and carefully type the new password.

Remember that passwords are case sensitive. Click Next. Click into the text entry box and type the password again. Click Done.

Next, we'll tell the iPad to erase all its data after 10 failed passcode attempts. This option is very secure, but it's not recommended if you have small children in your home – if they get their hands on your iPad, you can kiss your data goodbye. Scroll down, then click the switch next to Erase Data. Click Enable.

10.3.10 Configure iPad Access Control and Authentication (Simulation) Scenario

You are the IT administrator for a small corporate network. A new administrative assistant, Tyrell Lewis, uses an iPad to correspond with employees over email. You need to help him make the iPad more secure. The current simple passcode is 1542.

In this lab, your task is to complete the following:

• Set a secure passcode on the iPad: o Require a passcode: After 15 minutes o New passcode: H@rd2Guess

• Configure the iPad to erase data after 10 failed passcode attempts.


Explanation

In this lab, your task is to complete the following:

• Set a secure passcode on the iPad: o Require a passcode: After 15 minutes o New passcode: H@rd2Guess


• Configure the iPad to erase data after 10 failed passcode attempts.


Complete this lab as follows:

1. Set a secure Passcode on the iPad as follows: a. Select Settings .


b. From the left menu, select Touch ID & Passcode .


c. Enter 1542 for the passcode.


d. Select Require Passcode


e. Select After 15 minutes .


f. At the top, select Passcode Lock .


g. Next to Simple Passcode, click the switch to turn off simple passcodes.


h. Enter 1542 for the passcode.


i. Enter H@rd2Guess as the new passcode.


j. Select Next .


k. Enter H@rd2Guess to re-enter the new passcode.


l. Click Done .


2. Configure the iPad to Erase Data after 10 failed passcode attempts as follows: a. On the Touch ID & Passcode page next to Erase Data, click the switch to enable Erase Data.


b. Click Enable .

10.3.11 Activity: Research Information Security

In this activity, you will identify recent examples of cyberattacks that have exposed private information and damaged businesses and financial institutions.

1. Conduct online research to answer the following questions. o What major institutions have announced significant cyberattacks within the past three years?


o Approximately how many people have had their private information exposed as a result of each attack?


o Approximately how much money has each institution suffered in damages from each attack?


o What security vulnerabilities did hackers take advantage of in each attack?


o How could each attack have been prevented?


2. Write a one-page summary of your research.


10.3.12 Section Quiz (Section Quiz) q_itf_authentication_facts_01

Which of the following security measures is a form of biometrics? Answers:

• *Fingerprint scanner


• TPM


• Chassis intrusion detection


• BIOS password


Explanation:

A fingerprint scanner is a type of biometrics. The fingerprint scanner uses the ridges of your skin known as ridge minutiae. A Trusted Platform Module (TPM) is a special chip on the motherboard that generates and stores cryptographic keys to verify that the hardware has not changed. This value can be used to prevent the system from booting if the hardware has changed. Chassis intrusion detection helps you identify when a system case has been opened. A BIOS password controls access to the BIOS setup program.

q_itf_authentication_facts_02

What do biometrics use to perform authentication of identity? Answers:

• Knowledge of passwords


• Ability to perform tasks


• *Biological attributes


• Possession of a device


Explanation:

Biometrics is based on biological attributes. Biometrics is a strong form of authentication because each person has

unique characteristics. When these unique characteristics are used for authentication, they are more reliable and stronger than the best passwords. For example, no two people have the exact same fingerprint or retina pattern. q_itf_authentication_facts_03

Which of the following is not a form of biometrics? Answers:

• Fingerprint


• *Smart card


• Face recognition


• Retina scan


Explanation:

A smart card is used in token-based authentication, so it is not a form of biometrics. Biometrics rely on personal characteristics (such as fingerprints, facial recognition, or a retina scan) to prove identity. A smart card is an example of the authentication factor of Something You Have.

q_itf_authentication_facts_04

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone.

Which of the following digital security methods is being used? Answers:

• *Multifactor authentication


• DLP


• Smart card


• Firewall


Explanation:

Multifactor authentication is the process of authenticating a user by validating two or more claims presented by the user, each from a different category, such as a password and the possession of a mobile phone, or a password and a fingerprint.

Data Loss Prevention (DLP) programs or devices monitor operations such as file transfers and email for user activities that could compromise data security.

A smart card could be one authentication used in multifactor authentication, but it is not a password and does not validate by the possession of a mobile phone.

Firewalls are placed between the company network and the internet to filter network traffic at the IP level. They don't authenticate users.

q_itf_authentication_facts_06

Your company wants to use multifactor authentication. Which of the following would you most likely suggest? Answers:

• *PIN and smart card


• Fingerprint and retinal scan


• Password and passphrase


• Token and smartphone

Explanation:

Systems and accounts that need extra security often require multifactor authentication, generally from two or more types. This simply means you have to authenticate yourself two or more times to gain access to a system. Since a PIN is type 1 authentication and a smart card is type 2 authentication, these two would be considered multifactor authentication.

Since passwords and passphrases are both type 1, they would not amount to multifactor authentication. Since security tokens and smartphones are both type 2, they would not amount to multifactor authentication. Since fingerprints and retinal scans are both type 3, they would not amount to multifactor authentication. q_itf_authentication_permission

A business is requesting confidential information from a customer to complete an online transaction. Which of the following is the MOST important action the business should take as part of their information request?

Answers:

• *Obtain permission from the customer to process and store the confidential information.


• Inform the customer of how long the confidential information will be stored.


• Provide the customer with a video showing how the information will be used.


• Provide a digital copy of the confidential information to the customer.


Explanation:

When a customer provides confidential information to a business, the business should obtain permission (consent) from the customer to process and store the information.

While informing the customer of storage details is part of permission process, it does not include obtaining permission, which is what the business needs to do.

Providing a video showing how the confidential information will be used is not as important as first obtaining permission from the customer to process and store the information.

While providing a digital copy (such as a document) of the confidential information to the customer can be useful for future reference, it is not as important as first obtaining permission from the customer to process and store the information.

q_itf_authentication_type1

Which of the following are examples of Type 1 (something you know) identification? (Select two.) Answers:

• *Single-use passwords


• Hardware tokens


• Software tokens


• *Personally identifiable information (PII)


• Voice recognition


Explanation:

Type 1 authentication (which is something you know) includes single-use passwords and personally identifiable information (PII).

A hardware token (such as a fob or smart card) is an example of Type 2 authentication (something you have).

A software token (such as a security code sent by a bank) is an example of Type 2 authentication (something you have). Voice recognition is an example of Type 3 authentication (something you are).

q_itf_authorization_acl

You have authenticated to your company network, checked your current time-off balance, and entered a ticket to request an external hard drive for your company laptop computer.

However, when you try to delete an image of an old company logo from the marketing site, you receive an error message

that you are not authorized to perform this action.

Which of the following is the MOST likely reason for the error message? Answers:

• *A network access control list only grants you rights to view the file.


• The file server for the marketing site is down.


• You have used the wrong authentication type.


• You are using multifactor authentication instead of single sign-on.


Explanation:

Authorization is the process of deciding what users can do with network objects such as configuration files once they've authenticated to a network. These permissions are kept on an access control list, or ACL.

If you can see the file listed, it is unlikely that the file server is down.

Authentication types define different types of authentication that help prove who you say you are (such as passwords, smart cards, and biometrics). They do not focus on granting access rights to company files.

Multifactor authentication requires two or more authentication types (such as a password and a security code). Single sign-on lets you authenticate once for access to several systems. Both are authentication methods and do not focus on granting access rights to files.

q_itf_authorization_dac

Ryan has a Google Docs account and has created a family history spreadsheet to manage important family dates (such as birthdays and anniversaries). He has given full access to the spreadsheet to several family members to keep the information updated.

Which of the following BEST describes this type of access model? Answers:

• Mandatory access control


• Rule-based access control


• *Discretionary access control


• Role-based access control


Explanation:

Under discretionary access control (DAC), the owner is the only person with full access rights to a file and the only person who can allow others to view, edit, or copy the file. Google Docs is a common example of the DAC model. Mandatory access control (MAC) uses security clearance levels to decide which users can access which resources (such as a file). A file's owner (creator) is not given exclusive access to grant rights to others.

Rule-based access control is simply another way of describing both role-based and mandatory access control (MAC) and does not focus on giving the owner (creator) of a file exclusive access to grant rights to others.

Role-based access control modifies an access control list based on pre-configured rules, as opposed to discretionary systems where a single user can grant or revoke rights at will for other users.

q_itf_authorization_facts_01

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.

Which of the following security practices was violated? Answers:

• *Principle of least privilege


• Strong password policy

• Multifactor authentication


• Entry control roster


Explanation:

The technician violated the principle of least privilege, the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

Strong passwords are recommended to prevent unauthorized access, but in this scenario, the database is not password protected.

Multifactor authentication is the process of authenticating a user by validating two or more claims presented by the user, each from a different category, such as a password and the possession of a mobile phone, or a password and a fingerprint.

Security personnel can grant access to a physical area using an entry control roster. Only people on the roster will be granted access. A database is not normally protected by physical security.

q_itf_authorization_facts_02

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this?

Answers:

• *Directory permission


• Multifactor authentication


• Antivirus software


• Data loss prevention


Explanation:

Directory permissions can be set to allow or deny users or groups of users from reading, writing, updating, deleting, or executing files. In this scenario, Ann has read permissions but not write permissions.

Multifactor authentication is the process of authenticating a user by validating two or more claims presented by the user, each from a different category, such as a password and the possession of a mobile phone, or a password and a fingerprint.

Antivirus software can prevent a user from reading or executing a file. In this scenario, Ann could read the file.

Data Loss Prevention (DLP) programs or devices monitor operations such as file transfers and email for user activities that could compromise data security.

q_itf_authorization_facts_03

Which of the following access controls gives only backup administrators access to all servers on the network? Answers:

• *Role-based


• Mandatory


• Discretionary


• Authorization


Explanation:

Role-based Access Control (RBAC) is a type of access control that restricts access based on the user's role in an organization.

Mandatory access control is a rule-based control system. It uses security clearance levels to decide which users can

access which resources.

The discretionary access control, or DAC, model emphasizes the importance of the owner, or creator, of a resource. Authorization is the process of deciding what a user can do once they've authenticated.

q_itf_authorization_mac

Which of the following is an example of using security clearance levels to decide which users can access which network resources?

Answers:

• *Mandatory access control


• Rule-based access control


• Discretionary access control


• Role-based access control


Explanation:

Mandatory access control (MAC) uses security clearance levels to decide which users can access which resources (such as a file).

Rule-based access control is simply another way of describing both role-based and mandatory access control (MAC) and does not focus on security clearance levels.

Under discretionary access control (DAC), the owner is the only person with full access rights to a file and the only person who can allow others to view, edit, or copy the file. It is not based on security clearance levels.

Role-based access control modifies an access control list based on pre-configured rules, as opposed to mandatory systems where security clearance levels are used to determine access.

q_itf_authorization_privilege

As a system administrator, you are modifying access control lists to make sure that company employees are only given access to company resources that they need to do specific tasks.

Which of the following BEST describes this process of limiting access rights? Answers:

• Type 3 authentication


• Accounting


• *Principle of least privilege


• Non-repudiation


Explanation:

When you create or modify access control lists (ACLs) and policies, it's best to practice the principle of least privilege. This principle states that users only be given the access that they need to do their specific tasks and nothing more.

Type 3 authentication requires that you use something you are in order to authenticate (such as a fingerprint). It is not a process of granting access rights to company resources.

Accounting is the process of keeping track of user activity while attached to a system. It is not a process of granting access rights to company resources.

Non-repudiation is a method for making sure that a user cannot deny having performed a certain action. It does not focus on granting access rights to company resources.

q_itf2_accounting_01

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Answers:

• Authentication

• Authorization


• *Accounting


• Access control


Explanation:

If a malicious user gains access to the system, proper accounting lets administrators know how they gained access and what exactly they did. They can take steps to prevent further harm with this information.

Authorization is the process of deciding what a user can do once they've authenticated. Authentication is proving that you are who you say you are.

A successful access control framework is made up of three parts: authentication, authorization, and accounting. q_itf2_accounting_02

As a system administrator, you are trying to keep track of who does what on the company network. Which of the following describes this access control process?

Answers:

• Authorization


• Authentication


• Surveillance


• *Accounting


Explanation:

In an access control framework, accounting means keeping track of who does what on a computer or network. Authorization is the process of deciding what a user can do once they have authenticated themselves. It does not focus on keeping track of who does what on a company network.

Authentication is proving that you are who you say you are for access purposes. It does not focus on keeping track of who does what on a company network.

Surveillance is the process of monitoring and tracking aspects of a workplace, such as where employees are on company property and analyzing data communications. While some of this information could be useful to the system administrator, it does not provide extensive information on who does what on the company network. q_itf2_accounting_event

Which of the following are examples of event logging? (Select two.) Answers:

• A network file server keeping metadata for each file.


• *A web browser storing visited URLs in its history.


• A system manager implementing an access control list.


• An application requiring multifactor authentication.


• *A network keeping track of a user signing in and out of an account.


Explanation:

Whenever a user visits a website while using a web browser, the URL is recorded in the web browser history (which is a type of log).

Whenever a user signs into a network, a log records the login information.

While a network file server can store a file's metadata (which is part of the file data), metadata does not track events in a

log.

File systems use an access control list, or ACL, for each file and folder in the system. The ACL keeps track of which users can read, write, move, or delete each file. It does not log computer or network events.

Multifactor authentication is a security technology that requires two or more types of authentication to gain access to a system. It does not focus on logging computer or network events.

q_itf2_accounting_logs

Which of the following helps a system administrator ensure that users cannot deny having performed an action on the network by tracking computer and network events?

Answers:

• Principle of least privilege


• *Accounting logs


• Discretionary access control


• Multifactor authentication


Explanation:

Account logs compile event details of just about anything that happens on a computer or network, such as a user signing in or signing out, accessing or modifying a file, or visiting a website. These details can help a system administrator prove that a user has in fact performed a particular action.

The principle of least privilege is an access control principle that states a user should only be given the permissions they need to do their job and no more. It does not focus on providing details about events performed by a user on a computer or network.

Discretionary access control (DAC) means that the owner of a network object is the only person with full access rights to the object and the only person who can allow others to view, edit, or copy the object. It does not focus on providing details about events performed by a user on a computer or network.

Multifactor authentication is a security technology that requires two or more types of authentication to gain access to a system. It does not focus on providing details about events performed by a user on a computer or network. q_itf2_accounting_non-repudiation_01

Which of the following are examples of non-repudiation implemenation? (Select two.) Answers:

• *Surveillance cameras


• Mandatory access control


• Multifactor authentication


• Single sign-on


• *Biometrics


Explanation:

One of the most common non-repudiation techniques is to set up surveillance cameras to record actions by individuals. Another non-repudiation measure is to implement strong authentication protocols, like biometric factors such as fingerprints and retinal scans. These can provide strong evidence that an account was being used by its proper owner and not by an intruder.

Mandatory access control (MAC) uses security clearance levels to decide which users can access which resources (such as a file). It is not an example of implementing a non-repudiation mechanism.

Multifactor authentication is a security technology that requires two or more types of authentication to gain access to a system. It is not an example of implementing a non-repudiation mechanism.

Single sign-on is a method in which logging into one system gives access to other related systems. It is not an example

of implementing a non-repudiation mechanism. q_itf2_accounting_non-repudiation_02

April is an administrative assistant to the CEO of a financial auditing firm. She has just purchased several airline tickets for upper management and has received an electronic receipt via email and saved it for future reference.

Which of the following security concepts BEST describes receiving a receipt for purchasing the airline tickets? Answers:

• Software token


• Discretionary access control


• *Non-repudiation


• Single sign-on


Explanation:

Non-repudiation is a method for making sure that a user cannot deny having performed a certain action. This would include receiving a receipt for a product or service (such as an airline ticket) that shows that a specific person was intentionally involved in the transaction.

Software tokens are typically used as part of a two-factor authentication process and are an example of Type 2 authentication (something you have). They do not provide non-repudiation proof that a specific person was intentionally involved in a transaction such as purchasing an airline ticket.

Discretionary access control (DAC) means that a network object's owner is the only person with full access rights to the object and the only person who can allow others to view, edit, or copy the object. It does not provide non-repudiation proof that a specific person was intentionally involved in a transaction such as purchasing an airline ticket.

Single sign-on is a method of authenticating with one system to gain access to other related systems and can be associated with accounts that have restricted access. It does not provide non-repudiation proof that a specific person was intentionally involved in a transaction such as purchasing an airline ticket.

q_itf2_accounting_signatures

Besides logging computer and network events in a file, which of the following is another non-repudiation method? Answers:

• *Signatures


• Hardware tokens


• Discretionary access control


• Single sign-on


Explanation:

Physical or even digital signatures can provide proof that someone created a file or approved an action. This is an example of a non-repudiation method.

Hardware tokens (such as a fob or smart card) are an example of Type 2 authentication (something you have). They do not provide non-repudiation proof or address non-repudiation issues.

Discretionary access control (DAC) means that a network object's owner is the only person with full access rights to the object and the only person who can allow others to view, edit, or copy the object. It does not provide non-repudiation proof or address non-repudiation issues.

Single sign-on is a method of authenticating with one system to gain access to other related systems and can be associated with accounts that have restricted access. It does not provide non-repudiation proof or address non- repudiation issues.

q_itf_accounting_facts_01

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Answers:

• *Non-repudiation


• Authorization


• Authentication


• Integrity


Explanation:

If someone is caught trespassing on a network or stealing data, they are probably going to say it wasn't them. Non- repudiation is taking measures to prove that it most definitely was. The examples in this scenario are all good examples of non-repudiation techniques.

10.4 Data Encryption Section Introduction

As you study this section, keep the following questions in mind:

• Why is data encryption a vital part of computer security?


• What problems are inherent in symmetric encryption? How are these problems solved by asymmetric encryption?


• What should I do if an unencrypted website asks for my password?


After finishing this section, you should be able to:

• Describe the basics of data encryption, including encryption algorithms, certificates, and public and private key pairs.


• Explain how encryption can be used in both data transmission and storage.


• Use a web browser to secure a wireless network. o Change the SSID name.


o Use WPA2-PSK authentication with AES for encryption.


o Configure a secure pass phrase.


o Change the username and password for the wireless access point administrator login.


• Encrypt a folder on your computer.


• Add authorized users to an encrypted folder.


Key terms for this section include the following:

Term Definition


Data Encryption

The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.

Caesar Cipher

An early example of encryption used by Julius Caesar to send confidential military messages.


Data at Rest

Data in a persistent storage medium, such as a hard drive or optical disc.


Data in Transit

Data that are being transported from one device to another, whether by radio, electrical, or light signals.


Symmetric Encryption

A form of encryption that uses only one key to encrypt and decrypt a file. This is a less secure form of encryption.


Asymmetric Encryption

A form of encryption in which both parties involved have a public key and a private key. By using complex mathematical formulas, the computer generates the keys in a way that any file encrypted with the public key can only be decrypted by the private key.


Security Certificate

A way for two computers to verify their identity before they exchange information.


10.4.1 Encryption (Lesson Video) Transcript:

One of our most important concerns in today's world is how to keep our secret information secret. When you spend money with your credit card or send a private message to a friend, you want to be sure that only the right people have access to the data. Unfortunately, cybercriminals are constantly at work trying to steal your private data so they can pretend to be you and take your money. With the right equipment, a criminal can intercept your data while it's traveling across the wire to its destination.

In this video, we'll talk about encryption, which makes it so unauthorized people can't use your data even if they manage to intercept it.

One of the earliest examples of encryption was the Caesar cipher, which was used by Julius Caesar to send confidential military messages. The cipher worked by substituting each letter for the one that comes three letters later. A became D, B became E, and so on. Even if an enemy got their hands on the message, they couldn't read it. Only Caesar's generals, who knew the key, could decrypt and understand his messages.

The Caesar cipher is a good model for what happens in modern encryption. Plain text is encrypted using a key, and only people who have the key can decrypt it.

One way an attacker can try to find a key is by brute force, which means trying every single possible key, one at a time, until one of them works. In 1977, IBM developed the Data Encryption Standard, or DES. DES encryption used 56-bit binary keys, meaning each key could be one of 72 quadrillion possible values. DES worked fine for several years, but by the late ‘90s computers had become so powerful that a good one could brute force a DES key in just a few days.

In 2001, a new standard was created: The Advanced Encryption Standard, or AES. AES keys can be up to 256 bits long, which would take a modern computer trillions of years to brute force.

Digital data are generally in one of two states: at rest or in transit. Data in a persistent storage medium, such as a hard drive or optical disc, are considered at rest. Data that are being transported from one device to another, whether by radio, electrical, or light signals, are in transit. Fortunately, both kinds of data can be encrypted.

When you use the Internet, it's important to know when your connection is secure. You should never spend money or enter a password into an unencrypted connection. You can tell if a connection is encrypted by looking at the URL. If it begins with https, then any data sent to and from that site will be encrypted. If it just says http, that means the site sends and receives data as plain text, so you shouldn't enter any private information.

In this video, we learned about encryption. We discussed the Caesar cipher, the DES and AES encryption standards, and that encryption works for data at rest and data in transit. We also discussed the importance of using secure websites

when entering passwords or financial information.

10.4.2 Encryption Facts

This lesson covers the following topics:

• Encryption terminolgy


• Digital certificates


Encryption Terminology

Encryption is a vital way of keeping private information safe whether it's saved onto a storage device or being transmitted over the internet. The table below describes several terms related to encryption.

Table 1: Encryption Terminology Term

Description


10.4.3 Asymmetric Encryption (Lesson Video) Transcript:

Whenever you send a file over a network or Internet connection, there's a risk that an unauthorized party could intercept the transmission. That's why encryption is so important. Encryption scrambles your files so only authorized people who have the correct key can unscramble them. In this video, we'll look at asymmetric encryption, which is the most popular way to encrypt files for transmission.

Before we learn about asymmetric encryption, it'll be helpful to first look at symmetric encryption for comparison. Let's say this dude, Bill, wants to send a confidential file to his most excellent friend Ted. Using symmetric encryption, he'd generate a secret key and use it to scramble the file. Now that the file is encrypted, it can only be decrypted by using the key. However, this leads us to some big problems. If Bill sends the file with the key, a most heinous eavesdropper could steal both and use the key to decrypt the file. If he sends the file without the key it would keep the attacker out of the file, but it would also keep Ted out. The reason for these problems is that the encryption is symmetric – in other words, the same key is used to encrypt and decrypt the file.

With Asymmetric Encryption, each person has two keys – a public key and a private key. These keys have a special relationship to each other. By using complex mathematical formulas, the computer generates the keys in a way that any file encrypted with the public key can only be decrypted by the private key.

Now let's look at an example. Bill and Ted each have their own private key and their own public key. When they want to communicate securely with each other, they start by exchanging public keys. Of course, our odious interloper also has access to both public keys. If Bill wants to send an email to Ted, he can encrypt it with Ted's public key. At this point, even Bill himself can't decrypt the file. Only Ted, who has the matching private key, can decrypt it. Using this method, it doesn't matter if an attacker intercepts the file and the public key. As long as Bill and Ted keep their private keys private, the attacker won't be able to decrypt any of their messages.

In this video, we learned about asymmetric encryption, which uses public and private keys to encrypt and decrypt files. Asymmetric encryption is an excellent way to keep information secure as it travels over a network.

10.4.4 Certificates (Lesson Video) Transcript:

In this video, we're going to talk about security certificates. A security certificate is a way for two computers to verify they really are who they say they are before they exchange information. Let's look at an example.

First, let's look at what could happen without certificates. Suppose you wanted to watch some baby goat videos on YouTube. Your request would go from your device to YouTube's servers, and YouTube would respond by sending the video file back to your device. Unfortunately, it's possible for an attacker to intercept your signal, then pretend to

be YouTube and send you a harmful file in return. Since your device thinks the file is the one you requested, it downloads it, compromising your security.

Fortunately, most websites use security certificates. A certificate is kind of like an ID card that a website can use to prove that it really is who it says it is. Websites purchase certificates from trusted companies called certificate authorities. The certificate authority investigates the website and assures its identity, then issues the site a certificate. Let's look at the example again, this time with a certificate. You send a request for a baby goat video to YouTube's

servers. The servers respond by sending their certificate back to you. Next, your device checks with the certificate authority to make sure the certificate is legitimate. If it's fake, your browser rejects the connection. If it's real, your device and YouTube's servers form an initial connection called a handshake. Unlike real handshakes, digital handshakes actually prevent the transmission of viruses. During the handshake, the two computers use the certificate to agree on how they'll encrypt data. Once they've figured it out, they establish a secure communications channel called a secure sockets layer, or SSL. With the SSL connection in place, both computers can transmit information securely without worrying about eavesdroppers, and you can watch your baby goat videos worry free.

In this video, we learned about security certificates. Certificates are issued by a certificate authority. They verify the identity of a website and aid in data encryption.

10.4.5 Configure File Encryption (Demo Video) Transcript:

In this lab, you want to encrypt a folder so other users can't access its contents. To start, open File Explorer. From the left pane, click This PC. Then, double-click the D drive. Right-click the Finances folder, then click Properties. Click Advanced. Check the Encrypt contents to secure data box, then click OK. Then, click OK two more times.

Now we want to give Sam access to a specific file in the folder. Double-click the folder to open it, then right-click the 2019 report. Click Properties, then Advanced, then Details. This takes us to the list of users who can access this file. To add a new user, click Add. Select Sam from the list, then click OK on all of the dialog boxes.

10.4.6 Configure File Encryption (Simulation) Scenario

At work, you share a computer with other users. You want to secure the contents of the Finances folder so that unauthorized users cannot view its contents.

In this lab, your task is to:

• Encrypt the D:\Finances folder and all of its contents.


• Add the Sam user account as an authorized user for the D:\Finances\2019report.xls file.


Explanation

Complete this lab as follows:

1. Open the D: drive. a. From the Windows taskbar, select File Explorer .


b. From the left pane, select This PC .


c. From the right pane, double-click Local Disk (D:) .


a. Right-click Finances and then select Properties .


b. Select Advanced .


c. Select Encrypt contents to secure data and then select OK .


d. Select OK to close the properties dialog.


e. Select OK to confirm the attribute changes.


a. Double-click Finances .


b. Right-click 2019report.xls and then select Properties .


c. Select Advanced .


d. Select Details .

e. Select Add .


f. Select Sam and then select OK .


g. Select OK as many times as needed to close all remaining dialogs.


2. Encrypt the Finances folder.


3. Give Sam authorization to modify the 2019report.xls file.


10.4.7 Secure a Home Wireless Network (Demo Video) Transcript:

In this scenario, you want to secure a wireless network from unauthorized access. Every access point has a slightly different interface, but the principles you learn here will apply to all of them. To configure the wireless access point, open the Chrome browser. Click into the URL bar and type 192.168.0.254. When you press enter, you'll be prompted for a username and password. Right now, they are set to the factory defaults – admin and password. Don't worry, we'll change them later.

This is the management page for the wireless access point. We'll start by changing the name of the Wi-Fi network. This is also called the Service Set Identifier, or SSID. Click Wireless, then Basic. Using this box, change the SSID to FlyingFirstClass, then scroll down and click Apply. To finalize the change, we need to enter the default username and password one more time. Before we click OK, notice this warning that says the server is requesting the username and password in an insecure manner. That's the next thing we'll take care of. Click OK.

On the left pane, click Security. Right now, the security mode is set to WEP-OPEN. This is a very bad idea, because the WEP algorithm is notoriously insecure. Let's change it to WPA2-PSK, which stands for Wi-Fi Protected Access 2 with a pre-shared key. This algorithm is much more secure than WEP. We'll also configure a new password down here. Click Apply.

Next, we want to change the administrator credentials, which as you remember are still set to the factory defaults. On the left, click Administrator, then Management. Now we can change the administrator username and password, then click Apply.

Now that the access point is configured, we can connect our laptop to it. Go back to the computer desk, then click the laptop monitor. This is the network icon. The asterisk means it's not currently connected to a network. Click the icon, then select the FlyingFirstClass network. Make sure Connect automatically is selected, then click Connect. The security key is the same H@rd2Guess password we configured earlier. Click Next, then click Yes to make the laptop discoverable on the network. The asterisk has disappeared from the network icon, which means the laptop is now connected.

10.4.8 Secure a Home Wireless Network (Simulation) Scenario

You recently created a home wireless network to allow your laptop and mobile devices to make a connection to the wired network and the internet. However, without additional configuration, the wireless access point will allow connections from any laptop or mobile device within range. You need to secure the wireless network from unauthorized access.

To view and configure the wireless access point:

1. Use Chrome on Home-PC.


2. Go to 192.168.0.254 , and use the following default authentication credentials: o Username: admin o Password: password

In this lab, your task is to secure the wireless network using the following settings:

• Change the settings on the wireless access point as follows: o Use FlyingFirstClass for the SSID. The SSID name is case sensitive.


o Use WPA2-PSK authentication, with AES for encryption.


o Configure H@rd2Guess as the pass phrase. The pass phrase is case sensitive.


• Change the wireless access point's administrator authentication credentials from their defaults as follows: o Username: @dm1n


o Password: SomethingSecure! Do not save the credentials in Chrome.


• Return to the Computer Desk and configure the laptop to connect to the wireless network and save the wireless profile with the settings as listed above.


Explanation

In this lab, your task is to secure the wireless network using the following settings:

• Change the settings on the wireless access point as follows: o Use FlyingFirstClass for the SSID. The SSID name is case sensitive.


o Use WPA2-PSK authentication, with AES for encryption.


o Configure H@rd2Guess as the pass phrase. The pass phrase is case sensitive.


• Change the wireless access point's administrator authentication credentials from their defaults as follows: o Username: @dm1n


o Password: SomethingSecure! Do not save the credentials in Chrome.


• Configure the laptop to connect to the wireless network and save the wireless profile with the settings as listed above.


Complete this lab as follows:

1. Change the settings on the wireless access point as follows: a. From the taskbar, open Chrome .


b. In the URL field, type 192.168.0.254 and press Enter .

c. In the Username field, enter admin .


d. In the Password field, enter password .


e. Make sure Remember my credentials is not selected.


f. Click OK .


g. Maximize the window for easier viewing.


h. In the left menu, select Wireless .


i. Select Basic .


j. In the Wireless Name (SSID) field, enter FlyingFirstClass .


k. Click Apply .


l. In the Username field, enter admin .


m. In the Password field, enter password .


n. Click OK .


o. In the left menu under Wireless, select Security .


p. From the Security Mode drop-down list, select WPA2-PSK .


q. In the Pass Phrase field, enter H@rd2Guess as the pass phrase.


r. Select Apply .


a. On the left, select Administrator .


b. Select Management .


c. In the Account field, enter @dm1n as the new username.


d. In the Password field, enter SomethingSecure!


e. Click Apply .


f. Close Chrome.


a. From the top navigation tabs, select Computer Desk .


b. On the monitor of Home-Laptop, select Click to view Windows 10 .


c. In the notification area, select the Network icon.


d. Select FlyingFirstClass .


e. Make sure Connect automatically is selected.

f. Select Connect .


g. In the Security Key field, enter H@rd2Guess .


h. Click Next .


i. Select Yes to make your PC discoverable on the network.


2. Change the wireless access point's administrator authentication credentials from their defaults as follows:


3. Configure the Home-Laptop to connect to the wireless network and save the wireless profile as follows:


To confirm the connection, select the Network icon in the notification area or open the Network & Internet settings.

10.4.9 Section Quiz (Section Quiz) q_itf_encryption_ca

Which of the following describes an entity that issues digital certificates to certify the ownership of a public key? Answers:

• Public Key Infrastructure (PKI)


• *Certificate Authority (CA)


• Root certificate


• Data Encryption Standard (DES)


Explanation:

Another way to prove that you are communicating with a trusted source is to use a certificate authority. A CA is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key.

Digital certificates are often created and managed using a framework called a Public Key Infrastructure, or PKI. However, a PKI is an infrastructure for creating a digital certificate and is not an entity that issues the certificate.

A root certificate is a public key certificate that identifies a root certificate authority and is not an entity that actually issues digital certificates.

The Data Encryption Standard (DES) uses 56-bit binary keys to encrypt data in transit. It is not an entity that issues digital certificates.

q_itf_encryption_facts_01

Which Internet protocol is used to transmit encrypted data? Answers:

• *HTTPS


• HTTP


• FTP


• DNS


Explanation:

Of all the protocols on this list, only HTTPS encrypts data before sending it.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_encryption_facts_02

Which of the following protocols can be enabled so email is encrypted on a mobile device? Answers:

• *SSL


• POP3


• IMAP


• SMTP


Explanation:

SSL, or Secure Socket Layer, can be enabled so email is encrypted on a mobile device.

IMAP and POP3 are email retrieval protocols. SMTP is the protocol used to route email through the internetwork. q_itf_encryption_facts_03

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used?

Answers:

• *S/MIME


• POP3


• IMAP


• IMEI


Explanation:

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails. An encrypted email server will encrypt email communications between the server and an email client but will store the email in an unencrypted form. A proper certificate must be used to encrypt and decrypt S/MIME emails.

POP3 (Post Office Protocol 3) is an email protocol that will download and delete emails from a mail server.

IMAP (Internet Message Access Protocol) is an email protocol that can be used to synchronize email between multiple email clients on multiple devices.

IMEI (International Mobile Equipment Identity) is a number (usually unique) that is assigned by a manufacturer to a mobile device.

q_itf_encryption_facts_04

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

Answers:

• *WPA2 and AES


• WPA2 and TKIP


• WPA and AES


• WPA and TKIP


• WEP 128

Explanation:

Of the three wireless security protocols (WEP, WPA and WPA2), WPA2 is the most secure. Of the two encryption algorithms (TKIP and AES), AES is the most secure. q_itf_encryption_facts_05

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available.

Which of the following should the technician configure? Answers:

• *VPN


• IMAP


• Bluetooth


• Hotspot


Explanation:

A VPN (Virtual Private Network) creates an encrypted connection over a less secure network, such as the Internet. Sometimes called a tunnel, a VPN allows users to access corporate applications and resources.

IMAP (Internet Message Access Protocol) is an email protocol that can be used to synchronize email between multiple email clients on multiple devices.

Bluetooth is a technology that wirelessly connects two devices in close proximity to each other. It is most often used to connect peripheral devices such as headphones, speakers, mice, and keyboards to a computing device.

A hotspot is created on a mobile phone to supply internet connectivity to multiple devices through the phone's cellular connection.

q_itf_encryption_facts_07

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver? Answers:

• *Plain text


• Cipher text


• WPA2 encryption


• AES encrypted message


Explanation:

The information will be transmitted in clear text. The HTTP protocol sends and receives data as plain text, so the user shouldn't enter any private information.

Cipher text uses an encryption key to encrypt plain text so that only the recipient with the encryption key can decrypt it. WPA2 encryption is a WiFi encryption protocol.

AES stands for Advanced Encryption Standard. AES keys can be up to 256 bits long, which would take a modern computer trillions of years to brute force.

q_itf_encryption_facts_08

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Answers:

• *Cipher text

• Plain text


• Host-based firewall


• File level encryption


Explanation:

Sending the email using cipher text encrypts the message so that only the sender and receiver can read he content of the message.

Plain text could be read by anyone.

A host-based firewall would not provide any protection for the message.

File level encryption would protect the message but would require the client to be able to receive email attachments, which they cannot do.

q_itf_encryption_facts_09

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

Answers:

• *WPA2


• WEP


• WPA


• WPS


Explanation:

WPA2 provides the highest level of encryption for WiFi. WPA2 has replaced WPA and WEP.

Wi-Fi Protected Setup (WPS) is a wireless setup technique used to make it easier to connect a device to a wireless router. q_itf_encryption_facts_10

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Answers:

• *Full disk encryption


• Anti-theft lock


• Complex password


• Anti-malware


Explanation:

Full disk encryption refers to the encryption of the entire storage medium. Full disk encryption will provide the best protection for a stolen laptop. Even if the hard drive is removed and placed into another computer, the data cannot be accessed.

An anti-theft lock is a lock that attaches to the case of the laptop and then to a stable object that helps prevent the removal of the laptop. The lock doesn't protect the data from being accessed.

Password complexity is a best practice for passwords. However, the data would not be protected because the drive can be removed and placed into another system by an attacker. In this way, the attacker can take administrative control over the drive and access the data.

Anti-malware helps prevent malware from being placed on the computer to steal the data remotely, but if the laptop is stolen, it would not protect the data from being accessed.

q_itf_encryption_facts_11

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

Answers:

• *VPN


• Single sign-on


• Multifactor authentication


• Mandatory Access Control (MAC)


Explanation:

A VPN establishes a secure communications tunnel over a public network to a secure network. Using a VPN would provide secure transmission of the data.

The following do not secure the transmission of data over a public network:

• Single sign-on is a method of authenticating with one system to gain access to other related systems.


• Multifactor authentication requires two or more evidences of authentication, usually of different types.


• Mandatory Access Control (MAC) is a type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources.


q_itf_encryption_file

A system administrator wants to encrypt selected data on a hard drive that contains sensitive information. Which of the following data encryption types can the administrator use?

Answers:

• Whole disk encryption


• SSL/TLS encryption


• *File-level encryption


• HTTPS


Explanation:

Files or folders on a hard drive (data at rest) can be selectively protected by using file-level encryption, which is what the administrator wants to do.

Whole disk encryption is used to encrypt data at rest in a persistent storage medium such as a hard drive. It encrypts the entire hard drive instead of selected data.

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is used to encrypt data in transit such as an email. It is not designed to encrypt data at rest, such as files or folders on a hard drive.

HTTPS (Hypertext Transfer Protocol Secure) is used by the World Wide Web to transfer data over the internet. It uses the SSL (Secure Sockets Layer) protocol to encrypt the data. It is not designed to encrypt data at rest, such as files or folders on a hard drive.

q_itf_encryption_key

Which of the following do the sender and the receiver of encrypted text use to decipher and read information? Answers:

• *Key

• Secure code


• HTTPS


• Advanced Encryption Standard (AES)


Explanation:

Plain text is encrypted using a key, and only people who have the key can decrypt it. For example, sending an email using cipher text encrypts the message so that only the sender and receiver can read its content.

Secure codes are often sent as part of a security process such as resetting a password. However, they are not used to decipher encrypted text.

To add encryption, websites use a protocol called SSL. When combined, HTTP and SSL make HTTPS, which both transmits and encrypts data. However, it does not allow a receiver or sender to decipher the encrypted text.

The Advanced Encryption Standard (AES) allows encryption keys up to 256 bits long. It does not decipher encrypted text.

q_itf_encryption_ssl_01

Which of the following is designed to encrypt web page data accessed by a mobile device? Answers:

• File-level encryption


• Mobile device encryption


• *SSL/TLS encryption


• S/MIME


Explanation:

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is used to encrypt data in transit such as web page data. File-level encryption is designed to encrypt selected files or folders for data at rest (such as on a hard drive or optical drive). It does not encrypt data in transit such as web page data.

Mobile device encryption is a type of encryption used for data at rest, and is not designed to encrypt data in transit, such as web page data.

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol used to encrypt emails and is not designed to encrypt web page data.

q_itf_encryption_ssl_02

Which of the following encryption types is designed to encrypt data in transit? Answers:

• *SSL/TLS encryption


• File-level encryption


• Mobile device encryption


• Whole disk encryption


Explanation:

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is used to encrypt data in transit (such as web page data).

File-level encryption is designed to encrypt selected files or folders for data at rest (such as on a hard drive or optical drive). It does not encrypt data in transit (such as web page data).

Mobile device encryption is a type of encryption used for data at rest and is not designed to encrypt data in transit (such as web page data).

Whole disk encryption lets you encrypt data at rest on hard drives and optical drives at the disk level but is not designed to encrypt data in transit (such as web page data).

q_itf_encryption_whole_01

A systems engineer wants to encrypt a hard drive that contains critical data. Which type of data encryption can be used to protect the data on the hard drive?

Answers:

• *Whole disk encryption


• SSL/TLS encryption


• HTTPS


• WPA2 encryption


Explanation:

Whole disk encryption is used to encrypt data at rest in a persistent storage medium such as a hard drive.

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is used to encrypt data in transit, such as an email. It is not designed to encrypt data at rest, such as data storage on a hard drive.

HTTPS (Hypertext Transfer Protocol Secure) is used by the World Wide Web to transfer data over the internet. It uses the SSL (Secure Sockets Layer) protocol to encrypt the data. It is not designed to encrypt data at rest, such as data storage on a hard drive.

WPA2 (Wi-Fi Protected Access 2) is a wireless encryption protocol used by wireless network routers. It is not designed to encrypt data at rest, such as data storage on a hard drive.

q_itf_encryption_whole_02

Which of the following provides data encryption for an entire device such as a hard drive or optical drive? Answers:

• SSL/TLS encryption


• File-level encryption


• WPA2 encryption


• *Whole disk encryption


Explanation:

Whole disk encryption lets you encrypt data at rest on hard drives and optical drives at the disk level (entire drive). Files or folders on a hard drive (data at rest) can be selectively protected using file-level encryption. Whole disk encryption is specifically designed to encrypt all data on a hard drive or optical drive.

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is used to encrypt data in transit such as an email. It is not designed to encrypt data at rest, such an entire hard drive or optical drive.

WPA2 (Wi-Fi Protected Access 2) is a wireless encryption protocol used by wireless network routers. It is not designed to encrypt data at rest, such as an entire hard drive or optical drive.

q_itf_encryption_wpa2

Which of the following is the fundamental difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards?

Answers:

• WPA2 uses DES (Data Encryption Standard).


• WPA2 uses WEP (Wired Equivalent Privacy).

• *WPA2 uses AES (Advanced Encryption Standard).


• WPA2 uses Rivest Cipher with TKIP.


Explanation:

WPA2 uses the newer Advanced Encryption Standard (AES), which provides keys up to 256 bits long. It would take a a modern computer trillions of years to brute force this encryption.

WPA2 uses AES (not DES) encrypt data transmitted over the wireless network.

WPA2 has replaced WEP (Wired Equivalent Privacy) as the recommended Wi-Fi encryption standard.

WPA (not WPA2) uses Rivest Cipher (RC4), making it stronger by adding TKIP (Temporal Key Integrity Protocol).

10.5 Device Security Section Introduction

As you study this section, keep the following questions in mind:

• How can I stay safe on the Internet?


• What should I keep in mind when lending my device to someone else?


• What should I do if my device is lost or stolen?


After finishing this section, you should be able to:

• Describe the most important safeguards in protecting yourself from internet security risks.


• Describe best practices for using secure passwords.


• Describe how to avoid or protect yourself against different types of malware.


• Safely spend money on the internet.


• Configure Windows Defender to protect your home computer from malware.


• Configure Windows Firewall for different networks.


• Configure a remote wipe of a mobile device. o Use a web browser to login to icloud.com, find an iPad, and erase all data.


o Enter a phone number and message to be displayed on a missing iPad.


o Password length


o Password complexity


o Password reuse


o Password history


• Use the Local Security Policy tool in Windows to configure password restrictions:

Key terms for this section include the following:

Term Definition


Device Password

A method of protecting a computer device from unauthorized access by forcing users to log in before using the system.


Firewall

A device that controls the flow of network traffic to protect systems from unauthorized network connections.


Anti-Malware Software

Software that helps protect against malicious software infections.


Anti-Spam Software

Software that helps remove unwanted, unsolicited email.


Ecommerce

The buying and selling of products or services electronically, typically through the internet.


Data Destruction Policy

Directions for disposing computer devices and destroying data when it's no longer needed or when a storage device needs to be replaced.


Windows Defender

Anti-malware software that is installed and configured by default on Windows systems.


Windows Firewall

A host-based firewall installed by default with Windows that loads every time the computer starts up.


10.5.1 Password Best Practices (Lesson Video) Transcript:

Perhaps the most important part of computer security is authentication, which is proving that you are who you say you are. Modern computers use many authentication techniques, such as fingerprint scanners, facial recognition, and smart cards. The most common kind of authentication is the password.

Since cybercriminals would love to learn your password, you need to make sure it's almost impossible to guess. In this video, we'll review some best practices in selecting passwords. We'll also talk about how you might enforce password policies as an IT administrator.

With your password, hackers could take your money, steal your private information, and even commit crimes while pretending to be you. Because of this, good password habits are vital. First, keep your password secret. Never write it down, and never send it in an email. If a customer support representative asks you to send your password through an email, chat, or phone call, they're most likely a criminal trying to scam you. If you must share your password, only share it with a person you completely trust, such as a spouse. Second, choose a secure password. A good password should be around sixteen or more characters long and contain a combination of letters, numbers, and symbols. Also, choose a password that would be difficult to guess. Birthdays, anniversaries, and names of family members are poor choices for passwords. If you're using the word "password" as your password, pause this video right now and change it! Third, use a unique password for every account you make. If you use the same password for multiple services or sites, then a data breach at one will compromise your security at all of them. Finally, never enter your password into an unencrypted website. If you do, it will be sent as plain text, and someone could intercept the signal and learn your password.

Because most users have dozens of accounts for various applications and websites, many people choose to use a password manager. These programs are installed as an app or a web browser extension that's accessed with a master password. The password manager generates and encrypts passwords for all of your individual accounts. Most password

managers are safer and more secure than storing a list of usernames and passwords – and much better than using the same password for multiple accounts.

Now let's talk for a minute about enforcing password policies as an IT administrator.

Most companies use a configuration setting called an account policy to encourage employees to choose secure passwords. Account policies can be configured on individual computers or they can be grouped together and stored on a network domain as a group policy. Group policies can be applied to any account that logs into the domain.

Right here we're looking at an example of a local account password policy on Windows. Notice that we can enforce password history. This setting is designed to keep people from reusing old passwords. With password history enabled, you can choose from 1 to 24 passwords for the system to remember. A value of 24 means that the user has to use 24 unique passwords before they'll be allowed to reuse a password that they'd used before. Notice we also have a policy for setting the maximum password age. In other words, how long can the user keep the same password before it expires and they're forced to change it? A typical value for this setting is 90 days. Also, we have a minimum password age set for one day. This setting prevents users from reverting back to their old password immediately after they've changed it.

The minimum password length is currently set to seven characters, but this setting should be increased. Password complexity is also enabled, which means the password can't include the user's account name and that it must include a combination of lower- and upper-case letters, numbers, and non-alphabetic characters such as dollar signs, exclamation marks, and percent signs.

Finally, notice that storing passwords using reversible encryption is disabled, which is a very good idea. Enabling this setting would allow certain applications to essentially store passwords as plain text. This would make user accounts much less secure.

Now let's look at an account lockout policy. Notice here that we have an account lockout threshold set to 6 invalid logon attempts. This means that after users enter six incorrect passwords, they'll be locked out of their account. The purpose of account lockout policies is to prevent hackers from trying to guess someone's password and gain access to the system.

But since it's common for users to forget their own password, administrators often need to unlock users' accounts, typically by resetting the password.

This account lockout policy also includes an account lockout duration and lockout counter reset time, both of which are set here to 30 minutes. This means that if an administrator is not available to unlock an account, users can wait 30 minutes and try again, if they now remember their password.

Website accounts are often set up with a built-in password reset option. This allows users to reset their own password if they don't remember it. To verify their identity, users must either answer security questions, such as their

mother's maiden name, or enter a security code that's sent to a cell phone or to an alternative email address. When a password is reset, users are typically notified by email to make sure the resetting was intentionally done by them.

In this video, we learned about password best practices, such as keeping your password secret, choosing a secure password that's difficult to guess, and never entering your password into an unencrypted website. We also talked about user account password policies that can be enforced for an entire organization. These policies typically require password complexity, frequent password changes, and a minimum password length. We concluded with a discussion of account lockout policies and password reset options.

10.5.2 Password Facts

Perhaps the most important part of computer security is authentication, which is proving that you are who you say you are. Modern computers use many authentication techniques, such as fingerprint scanners, facial recognition, and smart cards.

This lesson covers the topic of password best practices. Password Best Practices

The most common kind of authentication is the password and passphrases. Since cybercriminals would love to learn your password/passphrase, you need to make sure it's almost impossible to guess.

Although passwords and passphrases are often used for the same purpose, there are some differences between the two. Passwords are typically a combination of letters and symbols, with no spaces. A passphrase is a longer string of text that makes up a phrase or sentence and can include symbols as well.

The following table reviews some best practices in selecting passwords and passphrases and enforcing password policies as an IT administrator.

Table 1: Password Best Practices Practice

Description

Password habits

With your password, attackers can take your money, steal your private information, and even


Password

Because most users have dozens of accounts for applications and websites, many people


Group

Most companies use a configuration setting called an account policy to encourage


Account

Account lockout policies are settings that protect an account if users fail to authenticate


Password

Website accounts are often set up with a built


Passphrases

Passphrases are best when they use:


10.5.3 Enforce Password Settings (Demo Video)

Transcript:

In this lab, you need to configure the password and lockout policies on a computer. Click Start, then scroll to Windows Administrative Tools, then select Local Security Policy. In the left pane, expand Account Policies, then click Password Policy. This middle pane shows the current policy settings. To change a setting, double-click it. First, we'll enforce password history. With this setting, the computer will keep a list of the 8 most recent passwords. New passwords must be different than the ones on the list.

Next, we'll change the maximum password age to 120 days. This means the user will need to set a new password every four months or so.

We'll set the minimum password age to 7 days. After creating a new password, the user must wait at least a week before changing it again.

We'll set the minimum password length to 10 characters. Last, we'll enable the complexity requirement, which requires passwords to use upper- and lowercase letters, numbers, and symbols.

Now that the password policy is set, let's set the account lockout policy by clicking it in the left pane. First, we'll set the account lockout threshold to four. If a user enters a wrong password four times in a row, they'll be locked out of the computer.

The account lockout duration has already been set to 30 minutes for us. This means that a locked account will automatically unlock itself in half an hour. To unlock it sooner, an administrator needs to give specific permission. Finally, we'll reset the account lockout counter after 15 minutes. If a user enters four bad passwords and waits for 15 minutes, they'll be given four new attempts before they're locked out.

10.5.4 Enforce Password Settings (Simulation) Scenario

You have been asked to perform administrative tasks for a computer that is not a member of a domain. To increase security and prevent unauthorized access to the computer, you need to configure specific password and account lockout policies.

In this lab, your task is to use the Local Security Policy to configure the following password and account lockout policies:

• Configure password settings so that the user must: o Cycle through 8 passwords before reusing an old one.


o Change the password every 120 days.


o Keep the password at least 7 days.


o Create a password at least 10 characters long.


o Create a password that meets complexity requirements such as using uppercase letters, lowercase letters, numbers, or symbols.


• Configure the account lockout policy to: o Lock out any user who enters four incorrect passwords.


o Unlock an account automatically after 30 minutes.


o Configure the number of minutes that must elapse after a failed logon attempt to 15 minutes.


Explanation

To complete this lab, you need to configure Local Security Policy as follows:

• Configure password settings so that the user must: o Cycle through 8 passwords before reusing an old one.

o Change the password every 120 days.


o Keep the password at least 7 days.


o Create a password at least 10 characters long.


o Create a password the meets complexity requirements such as using uppercase letters, lowercase letters, numbers, or symbols.


• Configure the account lockout policy to: o Lock out any user who enters four incorrect passwords.


o Unlock an account automatically after 30 minutes.


o Configure the number of minutes that must elapse after a failed logon attempt to 15 minutes.


Complete this lab as follows:

1. Set the password policies. a. Select Start and then select Windows Administrative Tools > Local Security Policy .


b. From the left pane, expand and select Account Policies > Password Policy .


c. Maximize the window and then expand the Policy column for better viewing.


d. From the middle pane, double-click the applicable policy to be modified.


e. Configure the appropriate value and then select OK .


f. Repeat steps 1d - 1e for the remaining password polices to be configured.


2. Set the account lockout policies. a. From the left pane, under Account Policies, select Account Lockout Policy .


b. From the middle pane, double-click Account lockout threshold .


c. Configure the lock out value to 4 and then select OK .


d. Review the suggested changes and then select OK .


e. Double-click Account lockout duration .


f. Configure the value to 30 and then select OK .


g. Double-click Reset account lockout counter after .


h. Configure the value to 15 and then select OK .

10.5.5 Securing Devices (Lesson Video) Transcript:

Computing devices are prime targets for cybercriminals, who seek to exploit the information they store. Cybercriminals collect personally identifying information, including government ID numbers, birth dates, addresses, email addresses, and phone numbers; financial information, such as credit card and bank account numbers; and account credentials, such as those used to log into e-commerce Web sites or online banking accounts.

Attempts to compromise this information are becoming more sophisticated every year, which makes them difficult to detect and prevent. Common device security mechanisms include device passwords, firewalls, anti-malware software, and anti-spam software.

Wireless access points, routers, and other devices often ship with a default password that would be easy for a hacker to guess. For this reason, it's important to change the default password to something secure. Computing devices such as laptops and smartphones typically give you the option of using the device without a password or another authentication method. While it's convenient to use your device without security, it's a really bad idea. If you lose the device, sensitive data could immediately be in the hands of a stranger.

Now let's talk for a minute about firewalls. Firewalls control the flow of network traffic and protect systems from unauthorized network connections. They're configured with a set of rules that define what kind of traffic is allowed and not allowed. For example, if a malicious user on the Internet tries to establish a connection to your computer, the firewall identifies this as a violation and blocks the connection.

There are two general types of firewalls: network firewalls and host firewalls.

Network firewalls are configured at the border of your network, where it connects to the Internet. By placing a firewall in this location, it can protect an entire network.

Host firewalls are installed on individual computer systems and can protect only that system.

Typically, most networks will use both types of firewalls. Network firewalls need to be purchased and manually installed. However, host-based firewalls are usually installed and enabled by default on most modern computer systems. Anti-malware software should also be installed on computer systems to detect and prevent malware infections. Malware includes several types of malicious software: viruses that attach to files and spread when the files are opened; worms that infect systems and spread automatically through the network; Trojan horse programs that appear to be useful programs but secretly install malware without your knowledge; spyware that tracks your computer or browser activity; and adware that displays unwanted pop-up advertisements.

Starting with Windows 7 and later, basic anti-malware software called Windows Defender is installed and enabled by default on Windows systems. You can also install third-party anti-malware packages.

But it's important to know that you can have only one anti-malware package installed on your computer at any one time. If you install a particular package and then later on choose to use a different one, be sure to uninstall the existing package before installing the new one.

In addition to malware, you'll likely need protection from spam. Spam is unwanted, unsolicited email that's sent to your email account. Some spam is merely annoying, not presenting a security risk to your computer. However, spam often carries viruses, advertisements for questionable products, and phishing attacks.

Some anti-malware software can also block spam for you, but some can't. If your package doesn't, you should consider installing additional anti-spam software or switching to an anti-malware package that's capable of blocking spam.

Another computer security risk relates to disposing of old computers and storage devices. When computers wear out or become obsolete, they're typically replaced with newer systems. However, you need to dispose of them in a manner that prevents sensitive data from being exposed.

For example, if you're selling or recycling a computer, you should first use a special utility to wipe the hard disk drive clean. Just deleting the files is insufficient. The data still remains on the drive and can be easily reconstructed by someone with the right skills. Disk wiping software overwrites the hard drive with random data, obliterating any old data that's still on the drive. If you're disposing of a computer, consider destroying the hard disk to make the data it contains inaccessible.

In this video, we discussed common ways to secure computing devices. Security mechanisms include strong passwords, firewalls, and anti-malware software. Before disposing of an old computer, you should destroy any data still on the drive.

10.5.6 Device Security Facts

Computing devices are prime targets for cybercriminals who seek to exploit the information. Cybercriminals collect

personally identifying information (PII), including:

• Government ID numbers.


• General information such as birth dates, addresses, email addresses, and phone numbers.


• Financial information, such as credit card and bank account numbers.


• Account credentials, such as those used to log into e-commerce websites or online banking accounts.


This lesson covers the topic of how to secure devices. How to Secure Devices

Attempts to compromise PII are becoming more sophisticated every year. Increased sophistication makes attempts difficult to prevent and detect.

The following table describes common device security controls to protect PII. Table 1: Secure Devices

Term Description


Device passwords

Wireless access points, routers, and other devices often ship with a default password that an


Firewalls

Firewalls control the flow of network traffic and protect systems from unauthorized network


Data

Data encryption is the process of translating data into an unr


Backups

Making a copy of your data, typically on a separate device, is another way to protect your data.


Anti-malware Anti



10.5.7 Configure Remote Wipe (Demo Video) Transcript:

In this scenario, you want to remote wipe an iPad. If your device is lost or stolen, you can use remote wipe to delete its data, which will keep it from falling into the wrong hands.

In Chrome, navigate to icloud.com and log in using the provided username and password. Click Find iPhone. This takes us to a map, where the iPad appears as a green dot. Unfortunately, our worst fears have been realized – the iPad is at the headquarters of the dastardly TestOut corporation. We'd better wipe it quickly before the fiendishly clever TestOut employees crack the password. Click All devices, then Tyrell's iPad. From here, click Erase iPad, then confirm. Just like before, enter the provided username and password.

At this point, we have the option to enter a phone number. This way, if someone finds the wiped iPad they'll be able to call and figure out how to return it. However, since we know the iPad is in the custody of the nefarious TestOut corporation, we'd better add a fake number to throw them off our trail. Click next.

Finally, we can enter a message that will display on the iPad. Again, this could be used to add your contact information. We'll enter a different message. Click Done, then click OK. The iPad has now been wiped.

10.5.8 Configure Remote Wipe (Simulation) Scenario

Tyrell Lewis has lost his iPad. He has a lot of sensitive data on the iPad, and he is concerned that it could fall into the wrong hands. He would like you to help him remotely wipe the iPad.

In this lab, your task is to assist Tyrell with the remote wipe as follows:

• Browse to icloud.com and login using the following credentials: o Apple ID: tlewis@icloud.com o Password: thaiGuy891!


• Using Find iPhone, select his iPad and erase it.

• Enter a phone number and message to be displayed on the iPad.


Explanation

In this lab, your task is to assist Tyrell with a remote wipe as follows:

• Log in to icloud.com using the following credentials: o Apple ID: tlewis@icloud.com o Password: thaiGuy891!


• Using Find iPhone, select his iPad and erase it.


• Enter a phone number and message to be displayed on the iPad.


Complete this lab as follows:

1. In the URL field in Chrome, enter icloud.com and press Enter .


2. Maximize the window for easier viewing.


3. In the Sign in to iCloud field, enter tlewis@icloud.com and press Enter .


4. Enter thaiGuy891! and press Enter .


5. Select Find iPhone .


6. Select All Devices .


7. Select Tyrell's iPad .


8. Select Erase iPad .


9. Select Erase .


10. In the Enter AppleID to continue field, enter tlewis@icloud.com and press Enter .


11. Enter thaiGuy891! and press Enter .


12. In the Number field, enter a phone number of your choosing to be displayed on the iPad.


13. Click Next .


14. Enter a message of your choosing to be displayed on the iPad.


15. Click Done .


16. Click OK .


10.5.9 Ecommerce Safeguards (Lesson Video) Transcript:

Whether it's a mobile banking app on your smartphone or an online purchase through Amazon, you've probably had some experience with ecommerce. Ecommerce simply refers to buying and selling products or services electronically, typically through the Internet. While ecommerce makes business transactions convenient and efficient, consumers need to adopt safeguards to protect themselves against identity theft and fraud.

Electronic commerce transactions can be conducted between a business such as Amazon and consumers. This is called business to consumer ecommerce. Or they can be consumer to consumer transactions through online services such as eBay, Craigslist, and Etsy. Businesses can also engage in ecommerce between themselves, business to business, or with the government.

Many traditional retail businesses such as Walmart and Target have become extremely successful in expanding their sales online. Other businesses such as Amazon have remained primarily online. Through ecommerce, you can purchase products that are physically shipped to your door or digital products that are delivered online, including music, video, educational materials, and consulting services.

So how does ecommerce work? Most retailers use online shopping carts that keep track of customer orders. The shopping cart typically saves an ID number in a small file called a cookie on the customer's computer. The cookie is associated with product numbers that are stored on the company's web server and displayed whenever a customer returns to the website. As mobile devices have overtaken desktop computers and tablets in the number of ecommerce transactions, apps have adopted other ways to keep track of customer orders.

The most important security issue is how ecommerce payments are authorized and processed. If your financial data is not handled securely online, it can easily be stolen by hackers.

Secure payment services such as PayPal have well established track records in facilitating ecommerce transactions between consumers and businesses all over the world. Venmo, Square Cash, Apply Pay, and other peer-to-peer payment services also do their part to maintain strict security standards.

However, much of the burden of online safety and security still falls on you as the consumer. Here are a few tips:

First, be very careful how and what you share online. Only share personal information when it's required and requested by a legitimate business that you trust. Avoid saving credit card numbers and other financial information in your online account. And if you use a mobile device for ecommerce, only share your device with people you would feel comfortable sharing your wallet with.

Second, never conduct ecommerce transactions using public WiFi or public computers that might have spyware installed. Ideally, you should do your online shopping on your home computer, behind a firewall with an up-to-date operating system and antivirus software installed.

Third, for online accounts, create strong passwords and use a credit card instead of a debit card whenever possible. Credit cards include better protection against online fraud. Always pay your credit card off in full every billing cycle to avoid their high interest rates.

Fourth, verify that the online retailer is conducting secure transactions using HTTPS rather than simply HTTP. This ensures that your financial data will be encrypted and less likely to be stolen by a hacker.

Fifth, conduct ecommerce transactions with people and businesses you trust. Investigate all online shopping websites and apps to make sure they're legitimate. Scammers keep themselves busy creating fake storefronts for unsuspecting customers. Examine URLs closely to make sure they don't include slight variations or misspellings of legitimate sites. If you're unfamiliar with an online shopping retailer, see if they have a social media presence and check out product reviews. When using peer-to-peer payment services such as Venmo, limit your transactions to people you know and trust.

Sixth, be extremely suspicious about deals that seem too good to be true. More often than not, these deals are online scams.

Ecommerce has revolutionized the way we buy and sell products and services. Online transactions can be as safe and secure as purchases at a traditional retail store but only if you consistently adopt online safeguards, such as being careful what you share online, never shopping over a public WiFi network, using strong passwords for online accounts, verifying that your transaction is secure, and making sure online shopping websites represent legitimate businesses.

10.5.10 Ecommerce Facts

Ecommerce refers to buying and selling products or services electronically, typically through the internet. While ecommerce makes business transactions convenient and efficient, consumers need to adopt safeguards to protect themselves against identity theft and fraud.

The table below describes six tips for consumers. Table 1: Ecommerce Safeguards

SAFEGUARD

DESCRIPTION


Be careful what you share

Share personal information only when it's required and requested by a legitimate business that you trust. Avoid saving credit card numbers and other financial information in your online account. If you use a mobile device for ecommerce, share only your device with people you would feel comfortable sharing your wallet with.


Don't use public WiFi

Never conduct ecommerce transactions using public WiFi or public computers that might have spyware installed. Ideally, you should do your online shopping on your home computer, behind a firewall with an up-to-date operating system and antivirus software installed.


Use passwords and credit cards

For online accounts, create strong passwords and use a credit card instead of a debit card whenever possible. Credit cards include better protection against online fraud.


Use HTTP Secure

Verify that the online retailer is conducting secure transactions using HTTPS rather than HTTP. This ensures that your financial data will be encrypted and less likely to be stolen by a hacker.


Shop with legitimate businesses

Conduct ecommerce transactions with people and businesses you trust. Investigate all online shopping websites and apps to make sure they're legitimate. Scammers keep themselves busy creating fake storefronts for unsuspecting customers. Examine URLs closely to make sure they don't include slight variations or misspellings of legitimate sites. If you're unfamiliar with an online shopping retailer, see if they have a social media presence and check out product reviews. When using peer-to-peer payment services such as Venmo, limit your transactions to people you know and trust.


Be suspicious

Be extremely suspicious about deals that seem too good to be true. More often than not, these deals are online scams.


10.5.11 Windows Defender (Lesson Video) Transcript:

One of the most important things you can do to keep your computer system secure is to make sure you've installed good anti-malware software. Anti-malware software tries to detect malicious files before they infect your system.

Windows Defender is anti-malware software that's installed and configured by default on Windows systems. If you don't have any other anti-malware software installed, it monitors your system by default.

To open Windows Defender, we'll go to the Settings App, select Update & Security, Windows Defender, and then we'll click Open Windows Defender. If you look here at this computer screen and you see green, that usually means things are looking pretty good. Defender has not detected any malware and your antimalware definitions are up to date. In fact, it tells us right over here that our PC is currently being monitored.

If, on the other hand, you see an orange screen, it indicates that something might be amiss. Usually, it means that your antimalware definitions are out-of-date and need to be updated.

If you see a red screen, it means something is seriously wrong and you probably have an infection of some sort that needs to be remedied. Down here it tells us what the current status of the system is. Notice here that it tells us that real- time protection is currently turned on.

Understand that with antimalware software there are two different aspects of the system that need to be protected. The first is to scan files in the file system for characteristics that might indicate that the file either is malware or contains malware of some sort. Windows Defender will perform these scans. The problem is that if you run a scan and you find malware on the system, it means your system's already infected and needs to be cleaned up.

Here's where the second aspect of system protection comes into play. It's much better to try to detect malware before it

infects your system, say as you are downloading a file from a malicious website on the internet. This is what we mean by real-time protection. Instead of just scanning for malicious files on your hard disk drives, real-time protection watches what you're doing and tries to detect malware as it's entering the system.

Here it tells us that our virus and spyware definitions are currently up to date; that's a good thing. Down here at the bottom it tells us the last time the system was scanned.

Now by default, Windows Defender is going to scan your system on a regular schedule. However, if you're concerned that some type of malware may have gotten on your system and you don't want to wait till the next scheduled scan, you can come over here and manually scan the system.

You have three different options you can choose from. If you choose a quick scan then Windows Defender is going to check for malware, but it's only going to look in the places where it's most likely to be found, such as your system folders. It does not scan the entire hard disk drive.

If you do want to scan every file on the entire hard disk drive, then you use the full option instead. The disadvantage of full obviously is that it takes a lot longer because you've have to go through every single file on the hard disk drive, whereas quick just looks for the places where malware is most likely to be found.

Or you can do a custom scan if you think that you know where that malware might be. You can click Custom and then select the location that you want to scan.

If we go over to the Update tab, we can check and see if our antimalware definitions are up to date, and it says that they are. Now notice that Defender uses two different sets of definitions, one is for viruses and the other is for spyware.

If you want to manually force an update, you can come over here and click Update definitions. You can also go to the History tab to see a list of items that were detected as potentially harmful.

In this lesson, we learned about Windows Defender, which provides default malware protection on Windows systems. Whether you use Windows Defender or other anti-malware software, you should keep malware definitions up to date and perform regular scans to detect malicious software.

10.5.12 Windows Defender Facts

One of the most important things you can do to keep a computer system secure is to make sure you've installed good anti-malware software. The purpose of anti-malware software is to detect malicious files before they infect a system. This lesson covers the topic of Windows Defender.

Windows Defender

The following table outlines useful terms about protecting a system through Windows Defender. Windows Defender is anti-malware software that's installed and configured by default on Windows systems. If you don't have any other anti- malware software installed, it monitors the system.

Table 1: Windows Defender Term

Description


Malware Anti


Real

The second aspect of system protection is detecting malware before it infects your system.


Manual scans

By default, Windows Defender scans your system on a regular schedule. However, you can


Virus

In the Windows Defender Security Center, you can see if your virus definitions are up to date.

To configure the Windows Defender Firewall, open the Control Panel and select System and Security, from there select Windows Defender Firewall. Here are some common configuration options:

• Select the Turn Windows Defender on or off option and select either turn on or turn off for private or public networks in your system. It is best to leave it on unless you are installing a third-party firewall.


• Select the Allow an app or feature through Windows Defender Firewall option to allow a specific app to communicate through the firewall. Here you can add, change, or remove allowed apps and ports.


• Select the Restore defaults option to return the Windows Defender Firewall setting to the Microsoft default settings.



10.5.13 Use Windows Defender (Demo Video) Transcript:

In this scenario, you'll configure Windows Virus & Threat Protection for your computer.

Right-click Start and select Settings. Select Update & Security. On the left pane click Windows Security, then click Virus & threat protection.

First, we want to add two exclusions. Exclusions are files or processes that will not be scanned by Windows Defender. Under Virus & threat protection settings, select Manage settings. Scroll down to Exclusions, then select Add or remove exclusions. Select Add an exclusion, then select File. From the left pane, browse to D, Graphics, cat.jpg, then click Open.

Click Add an exclusion again, then Process. In the Enter process name filed, type welcome.scr, then click Add.

Next, we need to find some information to answer this lab's multiple-choice questions. Click the back arrow twice, then scroll to Virus & threat protection updates and click Check for updates. This page shows information about Windows Defender, including the security intelligence version. When you click Check for updates, the security intelligence version changes.

Finally, we want to run a quick scan. Click the back arrow, then click Quick scan and wait for the scan to complete.

10.5.14 Use Windows Defender (Simulation) Scenario

You recognize that the threat of malware is increasing. As such, you would like to use Windows Virus & Threat Protection to protect your computer from malware.

In this lab, your task is to enable and configure Windows Virus & Threat Protection as follows:

1. Add a file exclusion for D:\Graphics\cat.jpg .


2. Add a process exclusion for welcome.scr .


3. Locate the current threat definition version number.


4. Answer Question 1.


5. Check for updates.


6. Answer Question 2.


7. Perform a quick scan.


Explanation

Complete this lab as follows:

1. Access the Virus & threat protection options. a. Right-click Start and then select Settings .


b. Select Update & Security .


c. From the left pane, select Windows Security .


d. Select Virus & threat protection .


2. Add a file exclusion for D:\Graphics\cat.jpg. a. Under Virus & threat protection settings , select Manage settings .


b. Scroll down to Exclusions and then select Add or remove exclusions .


c. Select Add an exclusion and then select File .


d. From the left pane, browse to and select Local Disk (D:) > Graphics > cat.jpg , and then select Open .


3. Add a process exclusion for welcome.scr. a. From the Exclusions dialog, select Add an exclusion and then select Process .


b. In the Enter process name field, type welcome.scr and then select Add .


4. Check for protection updates. a. In the top left, select the back arrow twice to return to the Virus & threat protection page.


b. Scroll down to Virus & threat protection updates and then select Check for updates to access the Protection updates page.


c. In the top right, select Answer Questions .


d. Answer Question 1.


e. Select Check for updates .


f. Answer Question 2.


5. Perform a quick virus scan. a. In the top left, select the back arrow to return to the Virus & threat protection page.


b. Select Quick scan .


c. Wait for the scan to complete.

6. From the Lab Questions dialog , select Score Lab .


10.5.15 Windows Firewall (Lesson Video) Transcript:

Windows security is a very broad topic. In this lesson, we'll focus on just one important security issue: configuring a firewall.

Firewalls restrict network traffic based on a set of rules. These rules determine what kind of network traffic is allowed through and what kind of network traffic is denied. The goal is to prevent unauthorized connections to computer systems. A firewall is like a gatekeeper guarding a door. It creates a barrier that makes it difficult for attackers to get access to a computer through the network. A firewall analyzes all of the network traffic that passes through it and compares it to the rules. If the traffic conforms to the firewall rules, it is allowed to pass on through. If it violates the rules, the firewall will block it.

There are two main types of firewalls that are commonly used: network firewalls and host-based firewalls. Network firewalls are located at the edge of a network, where it connects to the Internet. Host-based firewalls are installed on the individual computers within the network. In most networks, you will find both types of firewalls used together to protect systems.

Windows systems use the Windows Firewall as a host-based firewall. It is installed by default with Windows and is loaded every time the computer starts up. For the best security, firewalls are configured to block all traffic by default. Then, rules are configured that allow very specific, limited types of traffic through. These are called exceptions because they are exceptions to the default firewall rule.

The Windows Firewall uses a predefined set of default exceptions that allow you to perform common tasks on the network, such as accessing a web page, reading your email, and connecting to shared storage on network servers.

The Windows Firewall uses the Network Location Awareness feature to help ensure the computer is always set to an appropriate security level. Network Location Awareness allows you to define different firewall rules, depending on what type of network you are connected to: a private or public network. Using network locations provides flexibility and increased security. For example, if you are working on a notebook system at home or at work, this would be considered a private network. Here, the firewall rules can be relaxed a little bit because these network environments are considered to be safer. However, if you take that same notebook on a trip and are using it on a public wireless network at an airport or hotel, much more stringent firewall rules need to be applied because the network environment is much less safe.

We'll demonstrate how to manage the firewall on a Windows system. Let's start by coming over here to our search field and typing Windows Firewall.

Now, you'll notice that there are two different options in the search results that we can pick from, Windows Firewall with advanced security or just Windows Firewall. Since we won't need to use any advanced settings, we'll open the basic configuration utility, Windows Firewall. Notice here that it's in Control Panel rather than in the Settings App.

Now, if we look at this screen right here we see that there's a problem. The firewall state is currently off. This is not good. We need to turn the firewall back on.

Let's go over here and click Turn Windows Firewall on or off.

We want to turn the firewall on for both types of networks: private and public network locations.

Now, these default settings here work fairly well on a private network. You can see that we're going to be notified if Windows firewall blocks an app that's trying to communicate through the firewall, but we're going to have a list of allowed apps that will be allowed to communicate through the firewall. That's probably appropriate because there are certain applications we're going to be running that do need to send data back and forth through the host-based firewall. But this may not be the case if we're dealing with a public network. Because, if I'm on a public network, I'm probably at an airport somewhere or in a hotel, and most likely I'm going to want to turn this option on. I want to block all incoming connections because I don't think there's anybody out there on that public network that should be initiating a connection with my computer system, even if it's an allowed application. So we'll turn this option on for the public network profiles and click OK.

Things are now a lot safer with the Windows Firewall turned on. So, on our private network at home or work, for incoming connections we're going to block all connections to apps that are not in the list of allowed apps, and we're going to be notified if Windows Firewall blocks a new app that's trying to communicate through the firewall.

These settings are useful because if it's a legitimate application that needs to communicate through the firewall, it'll give

us the option to go ahead and allow that communication.

Now, we might already know about an installed application that needs to legitimately communicate through the Windows Firewall with other hosts on the network. But by default it's going to be blocked.

For example, let's say we have an XBOX that we want to allow through the firewall. Let's add an exception for it. We'll click Allow an app or feature through Windows Firewall. A list of known programs and devices is displayed. If needed, you can enable or disable an exception for these programs here. Let's click OK to apply the change to the firewall.

In this lesson, we learned about Windows Firewall. Firewalls are used to block unauthorized connections to the computer over the network. You can create an exception in the firewall to allow a particular application to communicate over the network though the firewall.

10.5.16 Windows Firewall Facts

There are two main types of firewalls that are commonly used: network firewalls and host-based firewalls. Network firewalls are located at the edge of a network, where it connects to the Internet. Host-based firewalls are installed on the individual computers within the network. In most networks, you will find both types of firewalls used together to protect systems.

Windows systems use the Windows Defender Firewall (formerly Windows Firewall) as a host-based firewall. It is installed by default with Windows and loads every time the computer starts up. It is configured to block all traffic by default, with several predefined exceptions that allow you to perform common network tasks, such as accessing a webpage, reading emails, and connecting to shared storage on network servers. The goal is to prevent unauthorized connections to computer systems.

The Windows Defender Firewall uses Network Location Awareness to help ensure that the computer is always set to an appropriate security level. Network Location Awareness allows you to enforce different firewall rules, depending on the type of network you are connected to. These network types include the following:

• Private


• Guest or Public


• Domain


The Windows Defender Firewall can be configured by clicking the Windows Defender Firewall link under System and Security in Control Panel. It can also be accessed through the Settings app under Update and Security.

Image 1: Configuring Windows Defender Firewall in Control Panel Table 1: Windows Defender Firewall Configuration Tasks Windows Firewall in Control Panel. Screenshot. />

</div>

<div class= TASK DESCRIPTION


Enable or Disable Windows Defender Firewall

If you need to enable or disable the Windows Defender Firewall, do the following:

1. In the Windows search field, enter Windows Defender Firewall and open Windows Defender Firewall .


2. Alternatively, you can open Control Panel and navigate to System and Security > Windows Defender Firewall .


3. Click Turn Windows Defender Firewall on or off .


4. Turn the Windows Defender Firewall on or off, as needed. Note that you can enable or disable the firewall separately for each type of network.


Allow or Block a Known App

If you have an application installed that needs to communicate through the firewall, you can add an exception for it. You can also block communications for the application. Either option can be configured by doing the following:


1. In the Windows search field, enter Windows Defender Firewall and open Windows Defender Firewall .


2. Click Allow an app or feature through Windows Defender Firewall . A list of known programs is displayed.


3. Enable or disable an exception for any of the programs listed. This can be done separately for each network type.


4. Click OK .


Allow an Unknown App

If you have an application installed that needs to communicate through the firewall that Windows isn't aware of, you can add an exception for it. However, you must first tell Windows Defender Firewall the name of the application's executable file. This is done by completing the following:

1. In the Windows search field, enter Windows Defender Firewall and open Windows Defender Firewall .


2. Click Allow an app or feature through Windows Defender Firewall .


3. To add a new app, click Allow another app... .


4. Click Browse , then browse to and select the application's executable file.


5. Click Open , and then click Add .


6. Enable an exception for the program. This can be done separately for each network type.


7. Click OK .


10.5.17 Configure Windows Firewall (Demo Video) Transcript:

In this scenario, you'll activate and configure Windows Firewall.

Like most applications, you can open Windows Firewall by typing its name into the search bar. We'll maximize the window to make it easier to see.

Right now, Private and Public networks are both marked in red, which means they are not protected by the firewall. To turn Windows Firewall on or off, click Turn Windows Firewall on or off. From here, we can turn the firewall on for both private and public networks. When you're done, click OK.

Next, we want to allow an application to communicate through the firewall. To do this, click Allow an app or feature through Windows Firewall. To add a new application to this list, click Change Settings, then Allow another app. Select the Arch98 program from the list, then click Add.

10.5.18 Configure Windows Firewall (Simulation) Scenario

Your roommate showed you an error message on her Windows 10 notebook system indicating that the firewall is turned off. She has asked you to fix the issue for her.

Your task in this lab is to configure the Windows Firewall as follows:

• Turn on the Windows Firewall for the Private network profile.

• Turn on the Windows Firewall for the Public network profile.


• Add the Arch98 application to the list of applications allowed to communicate through the firewall for all network types.


Explanation

Complete the following steps:

1. In the lower left corner of the screen, click Type here to search .


2. Type Firewall in the search box.


3. Under Best match , click Windows Firewall .


4. On the left side of the window, click Turn Windows Firewall on or off .


5. Turn the firewall on for both the Private and Public network profiles.


6. Click OK .


7. On the left side of the window, click Allow an app or feature through Windows Firewall .


8. Click the Change settings button.


9. To allow an unlisted program to communicate through the firewall, click Allow another app... .


10. Select the Arch98 program from the list and click Network types... .


11. Put a check mark in the box for both types of networks and click OK .


12. Click Add , then click OK .


Admin Use Only: IT451A

10.5.19 Section Quiz (Section Quiz) q_itf_passwords_biometric

Which of the following is an advantage to using biometric scanners over hardware tokens? Answers:

• Biometric scanners are cheaper to implement than hardware tokens.


• *Biometric scanners are harder to fool than hardware tokens.


• Biometric scanners use software tokens instead of more expensive hardware tokens.


• Biometric scanners can provide multifactor authentication.


Explanation:

Biometric scanners (Type 3 authentication) are the hardest to dupe (fool) of all the authentication types, including hardware tokens (Type 2 authentication).

Biometric scanners (Type 3 authentication) are the most expensive type of authentication to implement. Hardware tokens (Type 2 authentication) are cheaper.

Although software tokens can be cheaper to use than hardware tokens, biometric scanners do not use them. Instead, the scanners use a template in a database to compare against a scan.

Biometric scanners are a tool for simply matching a template in a database to a scan of a particular part of the body. They do not directly provide multifactor authentication.

q_itf_passwords_facts_01

Which of the following components of a successful access control framework is the process of proving that you are who you say you are?

Answers:

• *Authentication


• Authorization


• Accounting


• Access control


Explanation:

Authentication is the process of proving to the computer that you are who you say you are. It can include various types of authentication, such as a password, software token, or fingerprint.

Authorization is the process of deciding what a user can do once they've authenticated (proving that they are who they say they are).

Accounting means keeping track of who does what on a computer or network. It is not designed to prove that you are who you say you are.

Access control is a part of authorization and usually involves maintaining an access control list of permissions that allow users to perform specific actions.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_passwords_facts_02

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts.

Which of the following policies are BEST to configure? (Select TWO). Answers:

• *Minimum password length


• Enforce password history


• Account lockout duration


• *Account lockout threshold


• Maximum password age


• Password complexity


Explanation:

Set the Minimum password length policy to require a password equal to or longer than the specified length.

Set the Account lockout threshold policy to lock an account after the specified number of incorrect logon attempts. Incorrect policy choices for this scenario are:

• Enforce password history requires users to input a unique (previously unused) password when changing the password. This prevents users from reusing previous passwords.


• Maximum password age forces users to change the password after the specified time interval.


• Password complexity prevents using passwords that are easy to guess or easy to crack. It forces passwords to include

letters, symbols, and numbers, and also requires passwords of at least 7 characters. However, you cannot configure a longer password length requirement with this policy.


• Account lockout duration determines the length of time the account will be disabled (in minutes). When the time period expires, the account will be unlocked automatically.


q_itf_passwords_facts_03

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again.

Which of the following policies are BEST to configure? (Select TWO). Answers:

• *Enforce password history


• Maximum password age


• *Minimum password age


• Password complexity


• Minimum password length


Explanation:

Set the Enforce password history policy to prevent users from reusing old passwords.

Set the Minimum password age policy to prevent users from changing passwords too soon. Passwords must remain the same for at least the time period specified.

Use the Maximum password age policy to force periodic changes to the password. After the maximum password age has been reached, the user must change the password.

Use the Password complexity to require that passwords include letters, numbers, and symbols. This makes it harder for hackers to guess or crack passwords.

Minimum password length determines how many characters must be in the password. q_itf_passwords_facts_04

What is the main risk of using a password manager? Answers:

• *Master password is compromised


• Passwords using reversible encryption


• Minimum password age


• Password expiration


Explanation:

A password manager generates and encrypts passwords for all of your individual accounts. Most password managers are safer and more secure than storing a list of usernames and passwords, and they are much better than using the same password for multiple accounts. The main risk with password managers is if the master password is somehow compromised.

Reversible encryption, password age, and password expiration are all settings that can be managed independently of a password manager.

q_itf_passwords_facts_05

An IT department discovered that the users were not periodically changing their passwords. Which of the following password policies should they require of their users?

Answers:

• *Password age


• Password complexity


• Password length


• Password reuse policy


Explanation:

Maximum password age is a setting that determines how long a user can keep the same password before it expires and they're forced to change it. A typical value for this setting is 90 days.

Minimum password age is a setting that prevents users from reverting back to their old password immediately after they've changed it. This is usually set to one day.

Password complexity is a setting that makes sure a password doesn't include a user's account name and that it includes a combination of lower- and upper-case letters, numbers, and non-alphabetic characters such as dollar signs, exclamation marks, and percent signs.

Minimum password length can be set from 0 to 14 characters.

Password reuse policy refers to not using the same password for multiple accounts. If the password is compromised, the attacker may have access to multiple accounts.

q_itf_passwords_facts_06

The password policy below incorporates the following:

• Passwords must include at least one capital letter


• Passwords must include a mix of letters and numbers


• Passwords must be different from the past eight passwords


• Passwords must contain at least one non-alphanumeric character


Which of the following password best practices are being used? (Select TWO). Answers:

• *Password history


• *Password complexity


• Password age


• Password length


• Password lockout


• Password expiration


Explanation:

Password history is a setting that is designed to keep people from reusing old passwords. With password history enabled, you can choose from 1 to 24 passwords for the system to remember. A value of 24 means that the user has to use 24 unique passwords before they'll be allowed to reuse a password that they'd used before.

Password complexity is a setting that makes sure a password doesn't include a user's account name and that it includes a combination of lower- and upper-case letters, numbers, and non-alphabetic characters such as dollar signs, exclamation

marks, and percent signs.

Maximum password age is a setting that determines how long a user can keep the same password before it expires and they're forced to change it. A typical value for this setting is 90 days.

Minimum password age is a setting that prevents users from reverting back to their old password immediately after they've changed it. This is usually set to one day.

Minimum password length can be set from 0 to 14 characters.

Password lockout is a policy that sets the number of incorrect login attempts before the user account will be locked and require an IT technician or period of time before the account is unlocked and the user can attempt another login. q_itf_passwords_facts_07

Your friend Andrew has confirmed that someone has been using his password to log in to his social media account. He believes that two bank accounts may also have been compromised. Which of the following password best practices has Andrew MOST likely violated?

Answers:

• *Password reuse


• Password history


• Password length


• Password age


Explanation:

Password reuse policy refers to not using the same password for multiple accounts. If the password is compromised, the attacker may have access to multiple accounts.

Password history is a setting that is designed to keep people from reusing old passwords. With password history enabled, you can choose from 1 to 24 passwords for the system to remember. A value of 24 means that the user has to use 24 unique passwords before they'll be allowed to reuse a password that they'd used before.

Minimum password length can be set from 0 to 14 characters.

Maximum password age is a setting that determines how long a user can keep the same password before it expires and they're forced to change it. A typical value for this setting is 90 days.

Minimum password age is a setting that prevents users from reverting back to their old password immediately after they've changed it. This is usually set to one day.

q_itf_passwords_passphrase

Which of the following is the basic difference between a password and a passphrase? Answers:

• Passphrases are the same length as passwords but can include spaces.


• Passphrases are shorter than passwords and easier to remember.


• *Passphrases are longer than passwords and can include spaces.


• Passphrases are longer than passwords but more difficult to remember.


Explanation:

Passphrases are strings of text that are longer than passwords and make up a phrase or sentence that can include spaces. Passphrases are generally longer than passwords, as they make up a phrase or sentence.

Passphrases are easier to remember than passwords because they can include a phrase or sentence. They are also easier to remember because they can include spaces.

q_itf_passwords_policy

A system administrator for an international trade firm has discovered that one of the account executives frequently accesses a confidential file server but has not changed their password for over a year.

Which of the following would be the MOST effective solution to make sure that the executive manager immediately

changes the password?

Answers:

• Inform the account executive that the password needs to be changed immediately.


• Provide the account executive with existing training on password best practices.


• *Set the maximum password age in the executive's file server account policy to three months.


• Provide a password manager for the account executive.


Explanation:

Setting a maximum password age in the executive's account policy will force the executive to change the password the next time they log in (which is frequently).

While informing the account executive that the password needs to be change immediately might work, the executive could also forget to make the change or simply make it a low priority.

Providing existing password best practices training to the executive is a long-term solution, but this will not immediately resolve the issue.

A password manager is designed to safely and securely store passwords for multiple accounts. It does not solve the issue of immediately changing a password.

q_itf_passwords_requirements

When resetting a password for a website, which of the following are the MOST likely security identification requirements that you need to meet before the password can be changed? (Select two.)

Answers:

• Enter the new password twice.


• Meet the password complexity requirements.


• *Enter a security code.


• Add the password to a password manager.


• *Answer a security question.


Explanation:

To verify your identity when you use a website's password reset option, you're often required to answer a security question.

To verify your identity when you use a website's password reset option, you may be asked to enter a security code provided over the phone, via email, or via a text message.

While entering a new password twice helps verify that you are in fact entering the password you want, it is not associated with a security requirement to verify your identity.

Meeting password complexity requirements makes sure that you are entering a password that will be difficult for a hacker to acquire. However, it is not associated with a security requirement to verify your identity.

While adding the password to a password manager can help you remember and access the new password, it is not associated with a security requirement to verify your identity.

q_itf_passwords_sso

Jacob, a systems engineer, is working with his team to upgrade user security on the company network. One of his concerns is compromising several employee services and websites at the same time.

Which of the following authentication types could potentially cause this issue? Answers:

• *Single sign-on


• Multifactor authentication

• Type 2 authentication


• Type 3 authentication


Explanation:

Single sign-on is a method in which logging into one system gives access to other related systems. While this technology provides a convenience for company employees, it also presents the issue of a hacker being able to access the same services by using a compromised password.

Multifactor authentication is a security technology that requires two or more types of authentication to gain access to a system. It is not focused on giving access to several systems with one login.

Type 2 authentication uses software and hardware tokens to authenticate based on something that you have. It is not designed to provide one login for several related systems.

Type 3 authentication uses a biometric scanner to identify something that you are (such as a fingerprint) to provide access to a system. It is not focused on giving access for several systems with one login. q_itf_passwords_token_01

Which of the following scenarios is an example of using a software token for security authorization? Answers:

• A secured room requires a retinal scan before entering.


• You are given access to company networking resources based on your physical location.


• You are required to enter a Personal Identification Number (PIN) before using your debit card to make a purchase.


• *A smartphone app generates a code used for authentication to the company intranet website.


Explanation:

An example of using security tokens would be the installation of an app on your smartphone that constantly generates soft tokens sent and timed with the system you're trying to connect to.

A secured room requiring a retinal scan is an example of Type 3 authentication (something you are), while a smartphone app generating a code is an example of Type 2 authentication (something you have).

While access to company networking resources based on your physical (geographical) location is an example of Type 2 authentication, it does not involve using a software token.

A Personal Identification Number (PIN) is not a software token and is an example of Type 1 authentication (something you know). Software tokens are Type 2 authentication (something you have).

q_itf_passwords_token_02

Which of the following is an advantage to using a hardware token over password authentication? Answers:

• *Hardware tokens need to be physically stolen or copied to be used.


• Hardware tokens are less expensive to implement than passwords.


• Hardware tokens are easier to implement than passwords.


• Hardware tokens can be used in multifactor authentication.


Explanation:

Type 2 authentication (such as the use of a hardware token) is more secure than Type 1 authentication (such as the use of a password) because someone would need to physically steal or copy your hardware token to impersonate you.

Hardware tokens are more expensive to implement than Type 1 authentication (a password). They are also harder to implement.

Both hardware tokens and passwords can be used in multifactor authentication.

q_itf_passwords_type1_01

Which of the following methods falls under Type 1 authentication? Answers:

• *Single-use passwords


• Single sign-on


• Software tokens


• Facial recognition


Explanation:

Type 1 authentication methods include Personal Identification Numbers (PINs), single-use passwords (one-time passwords), and security question answers.

Single sign-on is a method in which logging into one system gives access to other related systems. While it involves using a password (Type 1), it is not an authentication method.

Software tokens are Type 2 authentication (something you have). Facial recognition is Type 3 authentication (something you are). q_itf_passwords_type1_02

Which of the following authentication types include security questions as a factor for providing security? Answers:

• *Type 1 authentication


• Type 2 authentication


• Type 3 authentication


• Single sign-on authentication


Explanation:

Type 1 authentication (something you know) is by far the most common authentication type and includes security questions.

Type 2 authentication (something you have) does not include security questions. Type 3 authentication (something you are) does not include security questions.

Single sign-on authentication is a method for logging into one system to gain access to other related systems. It is not a type of authentication and does not focus on security questions.

q_itf_passwords_type2

A system engineer is helping to design new security measures for company headquarters. Which of the following authentication factors could be included as a solution for Type 2 (something you have) authentication? (Select two.) Answers:

• A password


• *A fob


• *A physical location


• A pattern drawn on a screen


• A fingerprint

Explanation:

Examples of Type 2 authentication are keys, fobs, electronic chips, and smart cards. Another method that technically falls under Type 2 authentication is your physical location.

A password is an example of Type 1 authentication (something you know).

A pattern drawn on a screen is an example of Type 1 authentication (something you know). Many smart phones have their owners authenticate by drawing a specific pattern on the screen.

A fingerprint is an example of Type 3 authentication (something you are). q_itf_securing_controls

Firewalls, data encryption, backups, and passwords are designed to protect computing devices. These technologies are all examples of what?

Answers:

• File compression


• *Security controls


• Secure transactions


• Data protection


Explanation:

Common device security controls include such things as device passwords, firewalls, data encryption, backups, anti- malware software, anti-spam software, and data destruction.

File compression is a way of reducing the size of files, making them easier to store.

Secure transactions are the responsibility of consumers to adopt safeguards to protect themselves against identity theft and fraud.

Data protection includes ensuring the security of a device's sensitive information if it is lost or stolen, avoiding mobile device exploitation by a hacker, and protecting a device from being infected by a virus.

q_itf_securing_defender

A system administrator has Windows 10 running on all company laptops and desktops and is using Windows Defender as the default firewall on each individual computer system.

However, the IT department has just purchased a third-party firewall to install and use on company laptops and desktops. Which of the following is a best practice that the system administrator should perform to make sure that the new third- party firewall works properly?

Answers:

• Configure the third-party firewall to work with Windows Defender.


• Configure Windows Defender to work with the third-party firewall.


• *Uninstall Windows Defender to avoid conflicts.


• Set up a proxy server to coordinate network protection between the third-party firewall and Windows Defender.


Explanation:

There are many third-party firewalls available that you may want to try in place of Windows Defender. Just be sure to uninstall Windows Defender if you choose to go with a third-party firewall to avoid conflicts.

You should only run one host firewall on a computer system at a time, as they can conflict with each other. It would be difficult to configure the third-party firewall to work with Windows Defender and troubleshoot two firewalls running at the same time.

A proxy server can be configured as a network firewall, but it is not designed to coordinate network protection using two firewalls.

q_itf_securing_devices

Which of the following can be configured at the border of your network to control the flow of network traffic and protect systems from unauthorized network connections? (Select two.)

Answers:

• *Network firewalls


• Host firewalls


• Anti-malware software


• *Proxy servers


• Windows Defender


Explanation:

Network firewalls are configured at the border of your network; this is where the internet connection is. Proxy servers can be configured as network firewalls as well.

Host firewalls are installed on individual computer systems and can protect only that system and not the network.

Anti-malware software is installed on computer systems to detect and prevent malware infections. It does not control the flow of traffic or protect systems from unauthorized network connections.

Windows Defender is anti-malware software installed and enabled by default on Windows systems. It is not designed to serve as a firewall.

q_itf_securing_facts_01

Which of the following would best prevent an unauthorized person from remotely accessing your computer? Answers:

• *Firewall


• Anti-malware software


• Anti-spam software


• Lockdown device


Explanation:

Firewalls prevent unauthorized parties from accessing information on your computer. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_securing_facts_02

What are the two main types of firewall? (select two) Answers:

• *Network Firewall


• *Host-based Firewall


• Corporate Firewall


• Personal Firewall


• Public Firewall


• Private Firewall

There are two kinds of firewalls: network firewalls, which protect an entire network, and host-based firewalls, which protect a single computer.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_securing_facts_03

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as

     . Answers:

• *Spam


• Bloatware


• Illegal messages


• Cookies


Explanation:

Spam is the name given to all unwanted mass emails. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_securing_facts_04

A technician is installing a new SOHO wireless router.

Which of the following is the FIRST thing the technician should do to secure the router? Answers:

• *Change the router's default password


• Disable SSID broadcast


• Adjust the radio power levels


• Press the WPS button


Explanation:

The first security configuration on the router should be to change the router's default password. Disabling the SSID broadcast may be desirable for added security but is not the first thing to do.

Adjusting the radio power levels will limit the broadcast area and may be desirable for added security but is not the first thing to do.

Pressing the WPS button temporarily broadcasts the SSID and passphrase which will degrade security. q_itf_securing_facts_05

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?

Answers:

• *Changing the default administrative password


• Disabling DHCP


• Disabling SSID broadcast


• Implementing MAC address filtering

To prevent administrative access to the access point, change the default administrator password. If you do not change the password, users can search the Internet for the default password and use it to gain access to the access point and make configuration changes.

Disabling SSID broadcast, disabling DHCP, and using MAC address filtering helps prevent unauthorized access to the wireless network.

q_itf_securing_facts_06

Anna, a user, downloaded a free pdf editing application from the internet. Now the laptop constantly displays desktop popups and several applications won't start.

Anna was the victim of which of the following? Answers:

• *Trojan horse


• Spyware


• Social engineering


• Worm


Explanation:

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.

Spyware is malware that monitors a user's behavior without their knowledge. Spyware often secretly gathers information about a person or organization and relays this data to other parties.

Social engineering is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.

A worm is a type of malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself.

q_itf_securing_facts_07

You've just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat.

Based on the email message, which of the following are the next BEST actions to complete? (Select two.) Answers:

• Delete the indicated files if present.


• *Verify the information on well-known malicious code threat management Web sites.


• Distribute the message to everyone in your address book.


• Perform a complete system backup.


• Reboot the system.


• *Run a full anti-malware scan.


Explanation:

The best first step to take after receiving an email message about a new malicious code threat is to verify the information it contains. You can easily verify information by visiting two or more well-known malicious threat management Web sites. These sites can be your anti-malware vendor or a well-known and well-regarded Internet security watch group. All too often, messages of this type are hoaxes. It is important not to fall prey to email hoaxes or spread them to others. If

you are still concerned, you could run a full anti-malware scan on your system.

Your first step should not be to follow any directions included in the email, especially deleting files. You should never forward email warnings until you have firmly established the authenticity and validity of such information. Making a full backup is often a good idea, but it is not necessary in this instance.

q_itf_securing_facts_08

You have set up a wireless network, changed the SSID, and enabled encryption. You are still concerned about security. What should you do next?

Answers:

• *Change the default administrator password.


• Change the router's broadcasting channel.


• Enable the option to use the router without a password.


• Enable the router's remote administration.


Explanation:

Wireless access points, routers, and other devices often ship with a default password that would be easy for a hacker to guess. For this reason, it is important to change the default password to something secure.

Changing your wireless router's broadcasting channel could increase the network's performance but would not make it more secure.

Enabling remote administration for the router would not make the network more secure. Using the wireless router without a password would make the network much less secure. q_itf_securing_facts_09

Carol is traveling for business and attending a conference. The conference center provides free Wi-Fi. Which of the following would BEST protect a laptop from unauthorized remote access?

Answers:

• *Host-based firewall


• Firewall appliance


• Anti-malware


• Full disk encryption


Explanation:

A host-based firewall would offer the best protection for the laptop on the public network by preventing remote access connections.

A firewall appliance would not be practical for use with a laptop and has the purpose of protecting access to an entire network.

Anti-malware helps prevent programs from getting installed that may enable remote access but does not provide remote access protection like a host-based firewall.

Full disk encryption would be helpful in protecting the data on the laptop; however, once a system is booted, the encryption is not active and would not prevent access to the data from a remote host.

q_itf_securing_location

Adam is a marketing manager for a financial advisory firm and is sitting in an airport terminal waiting for a connecting flight. Adam is connected from his laptop to the free Wi-Fi service available in the terminal, has just finished a client's financial statement, and wants to upload it to a cloud-based company document storage server.

Which of the following is the BEST solution for Adam to securely upload the file? Answers:

• *Wait until he has access to a secured network service before uploading the financial statement.

• Make sure no one around him is shoulder surfing when he enters the password into the storage server.


• Clear all caches in his web browser before he connects to the storage server.


• Make sure that the anti-malware software is running on his laptop before uploading the financial statement.


Explanation:

While using an open network like the one described in the scenario, Adam should not transfer any sensitive data. These types of networks are not secure and could easily be hacked. Instead, he should wait until he has access to a secure network service.

Protecting the storage server password from shoulder surfing attacks does not prevent a hacker from intercepting the sensitive data in the financial statement over the free airport network.

Clearing all caches in a web browser is a safe web browsing practice that focuses on protecting someone from viewing the websites you've visited on a public workstation. It does not provide protection while uploading sensitive data.

Anti-malware software protects against viruses and similar cyber attacks. It is not designed to protect the transfer of sensitive data from a local laptop to a cloud-based storage service.

q_itf_securing_password

As a systems engineer, which of the following is the BEST way to secure a new wireless access point or router that you have just installed?

Answers:

• *Change the device's default password.


• Make sure to use data encryption.


• Enable the default firewall or a third-party firewall.


• Configure anti-malware software.


Explanation:

Wireless access points, routers, and other devices often ship with a default password that's easy for a hacker to guess. For this reason, it's important to change the default password to something secure.

Data encryption is the process of translating data into an unreadable form that can only be deciphered if you have access to a secret key. It does not protect an installed network device from hackers.

Firewalls control the flow of network traffic and protect systems from unauthorized network connections. They are not the best way to protect an installed network device from hackers.

Anti-malware software detects and prevents malware infections. It is not designed to protect network devices from hackers.

q_itf_securing_patch

Which of the following should you do on a regular basis to secure your device from cybercriminal attacks? Answers:

• Update your data encryption.


• Update your data destruction policies.


• Update your computer password and lockout policies.


• *Update and patch your OS files, driver software, and firmware.


Explanation:

It's important to update or patch your computer and other devices on a regular basis to make sure they do not become

exploitable by the latest cyber attacks.

Data encryption is the process of translating data into an unreadable form that can only be deciphered by a secret key. Data encryption itself does not need to be updated on a regular basis.

Data destruction policies cover the disposal of old computers and storage devices in a way that prevents sensitive data from being exposed. They are not focused on protecting your devices from cybercriminals.

Updating your password and lockout policies can help prevent someone from directly accessing your computer's software and files, but this is not designed to protect your computer from cybercriminals. q_itf_ecommerce_facts_01

Why is it better to use a credit card than a debit card for online purchases? Answers:

• *Credit cards have better fraud protection


• Credit cards have better interest rates


• Debit cards require you to pay additional fees


• Credit cards keep track of all your transactions


Explanation:

Credit cards have superior fraud protection compared to debit cards. If someone steals your credit card info, the card issuer will often be able to cancel any fraudulent charges made in your name. That said, credit cards have extremely high interest rates and should be aggressively paid off in full every month.

Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4. q_itf_windefender_facts_01

Which software is Microsoft's anti-malware product that is preinstalled on most new computers? Answers:

• *Windows Defender


• Norton Antivirus


• McAfee VirusScan


• ESET NOD32


Explanation:

Windows Defender is an anti-malware program created by Microsoft and automatically installed on many versions of Windows. The other three programs are created by other companies and must be purchased before they can be used. Reference:

LabSim for TestOut Desktop Pro Plus, Section 1.4.

10.6 Business Continuity Plans Section Introduction

As you study this section, keep the following questions in mind:

• Which of my files should I back up?


• How does redundancy make a system more secure?


• What would I do if my computer suddenly stopped working?


After finishing this section, you should be able to:

• Compare and contrast classification schemes for handling confidential information.

• Define data, network, and power redundancy and explain how they contribute to fault tolerance.


• Explain why it's important to back up data files.


• Describe backup procedures for different types of data.


• Explain the purpose of business continuity plans.


• Describe the common components of a disaster recovery plan.


• Configure Windows backup settings.


• Describe the advantages and disadvantages of various RAID levels.


• Add a UPS to a workstation and monitor.


• Connect and plug in the appropriate cables needed for a UPS.


• Use Windows Disk Management to create and format volumes for RAID arrays. o Create both striped (RAID0) and mirrored volumes (RAID1).


o Format volumes using NTFS.


• Enable File History on a volume.


• Configure File History to regularly save copies of files and to save file versions for a certain period of time.


• Use File History to restore previous versions of files.


Key terms for this section include the following:

Term Definition


Information Sensitivity

An attribute used to classify information based on the risk of public disclosure.


Public/Private Classification

A scheme for classifying information based on different levels of public/private distinctions.


Government/Military Classification

A scheme for classifying information based on government and military requirements.


Data Destruction Policy

Directions for disposing computer devices and destroying data when it's no longer needed or when a storage device needs to be replaced.


Data Center

An area used to store and share such things as computer systems, applications, data, and other components such as switches and routers. Data centers may be a room in a building, an entire building, or a group of buildings.

Data Redundancy

A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.


Network Redundancy

A method of increasing fault tolerance by providing multiple network paths between hosts.


Site Redundancy

A method of increasing fault tolerance by providing a complete duplicate of the computers and data at a location away from your main business location.


Power Redundancy

A method of increasing fault tolerance by providing power backups and power failover.


Failover

The ability to automatically switch to a redundant component/system, such as a power source, a hard disk, a network, or a site.


Redundant Array of Independent Disks (RAID)

A way to combine smaller and less-expensive disks into a single unit that works together to provide data redundancy.


Backup File

A copy of a file which can be used when the original file has been lost or corrupted. Backup files are typically stored on a separate device, such as a disk, the cloud, or in the network.


Ad Hoc Backup

Unscheduled backups performed periodically.


Regular Backup

Regularly scheduled backups.


System Backup

A backup of the system software, including operating system files.


Bare Metal Backup

A backup that gives you the ability to restore an entire system, including the operating system without needing to install anything on the computer prior to the restoration.


Database Backup

A backup of data stored in a database.


Local Backup

Backups that are stored in the same building or even the same room as the computer systems they are taken from.


Off-site Backup

Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time.


Disaster Recovery

An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.


Network Attached Storage

A device that contains one or more hard drives that users can access over the network.


Business Continuity

The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.


10.6.1 Handling Confidential Information (Lesson Video) Transcript:

One of the most important responsibilities of businesses is to protect the confidential information of customers, employees, and the company as a whole. This requires strict policies and procedures for disclosing, storing, and securing information. Company privacy and security policies need to be based on the type of information they're dealing with. In this video, we'll discuss different classification schemes that can be used to protect information.

Many organizations classify information based on a scale of high, medium, or low sensitivity. Highly sensitive information includes the personally identifiable information, or PII, of employees or customers, such as home address, driver's license number, and date of birth. It also includes protected health information, or PHI, such as patients' medical records, payment history, and current health status. This highly sensitive information needs to be secured against hackers and disposed of according to applicable laws and regulations.

Confidential company information that could result in an extreme loss of public trust, financial loss, or operational harm would also be classified as highly sensitive.

If the public disclosure of information could possibly result in significant though not extreme harm, financial loss, or personal embarrassment, it would be classified with a medium sensitivity. Information of low sensitivity would result in limited or no harm when publicly disclosed.

Another popular scheme for classifying information uses different levels of public/private distinctions. Classifying something as Public with Full Distribution allows anyone to have a copy of the information. Examples include a public website that everyone can access, company brochures, and marketing material.

A Public with Limited Distribution class allows public access with restricted distribution. A good example would be a software company that recruits beta testers for their products. An organization like this distributes code or software to a limited group for testing. Beta testers would be required to sign a Non-Disclosure Agreement, or NDA, restricting them from distributing the software and, in most cases, from talking about any of its features.

The Private classification has at least a couple of levels. Private Internal includes documents such as personnel records, financial ledgers, accounting documents, and customer lists. This is information you don't want released to the public. Distribution needs to be limited to individuals within the organization.

Private Restricted includes trade secrets, strategic information, and anything that's highly sensitive. Publicly exposing this information could seriously damage an organization. For example, the Google search algorithm or the source code for iOS. If this information were to be leaked, it would cause significant damage to the company. Access to this information would be restricted to a limited group of authorized personnel within the organization.

Companies that work with government and military contracts need to be aware of their classification levels. The specific levels we'll talk about here are used by the United States government, but most countries use a similar system.

Unclassified information can be viewed by the public and poses no security threat.

The next classification is Sensitive, but Unclassified, where the government or military would prefer that the information not be available, but it's still unclassified. Disclosure could cause harm, but the harm would be minimal.

The next level is Confidential. This classification allows restricted information release under the Freedom of Information Act. Releasing this information to the public could might some damage to military efforts.

The next level is Secret. Examples include troop movements, deployments, and overall capabilities. Disclosure of Secret information could cause serious, irreparable damage.

The highest classification is Top Secret, which includes weapons programs and intelligence-gathering activities. The release of Top-Secret information can pose a grave threat to the country and national security.

Data security policies need to include directions on disposing and even destroying data when it's no longer needed or

when a storage device needs to be replaced. This is especially important when dealing with highly sensitive or classified information.

Data destruction techniques include using a special utility to wipe hard disk drives clean by overwriting them with random data. Another option is to physically destroy the hard disk to make the data it contains inaccessible.

In summary, company security policies require classification schemes and procedures for handling different types of confidential information. Sensitivity classifications can include high, medium, or low. They could also use public/private distinctions, such as Public Full Distribution, Public Limited Distribution, Private Internal, and Private Restricted.

Some companies need to be aware of the government and military classifications: Unclassified, Sensitive, Confidential, Secret, and Top Secret.

Highly sensitive or classified information needs to be protected using the most advanced access control, encryption, and data destruction methods.

10.6.2 Confidential Information Facts

One of the most important responsibilities of an organization is to protect the confidential information of customers, employees, and the entire organization.

This lesson covers the topic of how to handle confidential information. How to Handle Confidential Information

Protecting information requires strict processes for disclosing, storing, and securing information. Keep in mind that:

• Policies are based on measurable standards that are determined by the organization. Privacy and security policies should be based on the sensitivity of the information.


• Procedures are specific steps for specific tasks or situations.


• Guidelines give direction for situations that do not fit within a specified policy because of the dynamics or complexity of the situation.


The following table describes concepts that apply to developing policies, procedures, and guidelines for handling confidential information.


Table 1: How to Handle Confidential Information Concept

Description


Information sensitivity

Many organizations classify information based on a scale of high, medium, or low

Public/private

A popular scheme for classifying information is to use levels with public/private


Government/military

Companies that work with government and military contr


Data destruction

Data security policies should include directions for disposing of data (including


Human Resources

Managing an organization's employees is complex. Clear policies help the


Human Resources is responsible for training the employees in these policies and for enforcement of any disciplinary actions, including termination.

10.6.3 Fault Tolerance (Lesson Video) Transcript:

Sometimes, things go wrong. This is true in every aspect of life, and computer systems are no exception. Components wear out and break, data gets corrupted and lost, and natural disasters can disrupt power and destroy hardware.

Fortunately, just like with other areas of life, problems aren't nearly as bad if you're prepared for them.

For computer systems, the concept of preparing for things to go wrong is called fault tolerance. If a system is fault tolerant, it will continue to function correctly even if a critical part of the system fails. This is usually accomplished by providing redundancy. In this video, we'll look at three kinds of redundancy: data redundancy, network redundancy, and power redundancy. Did I mention redundancy?

Hard disks are notorious for failing unexpectedly. To avoid data loss, many systems implement a RAID, or Redundant Array of Independent Disks. With a RAID, all data is stored on two or more disks simultaneously. If a disk fails, the data can still be accessed by using the other disks.

Another data redundancy strategy is replication, which is basically copying data to a different physical location. That way, the data will be protected even in the event of a fire or other disaster.

For a server to work, it must be connected to the other computers on the network. Without this connection, the server may as well not exist. There are two main ways to provide fault tolerance for a server. The first way is to install multiple network interface cards into the server. If one card fails, the others can take over. The other way is to allow multiple paths between the server and the computers on the network. With redundant connections, it's much less likely that a server will be cut off from the network.

Computers need a constant supply of electricity to work. To protect against data or service loss from power outages, it's important to have power redundancy. An easy way to do this for individual machines is to plug them into an uninterruptible power supply, or UPS. A UPS is a large battery that's connected both to the computer and the wall outlet. As long as power is coming in from the wall, the computer uses that power directly. However, if the power from the wall shuts off, the computer immediately jumps to battery power.

In this video, we discussed the concept of fault tolerance. We also looked at data, network, and power redundancy.

10.6.4 Fault Tolerance Facts

Computer systems can fail. Components wear out and break; data gets corrupted and lost; and natural disasters can disrupt power and destroy hardware. A contingency plan specifies the procedures and processes for mitigating loss of systems that support critical company workflows and resources.

A major part of a contingency plan is to provide redundancy (fault tolerance) for the critical aspects of the organization. When fault tolerance has been implemented correctly, a system continues to function correctly using a failover to a backup system even if a critical part of the system fails.

This lesson covers the topic of fault tolerance. Fault Tolerance

The table below describes three kinds of redundancy: data redundancy, network redundancy, and power redundancy. Table 1: Fault Tolerance

Term Description

Data center

A data center is an area used to store and share such things as computer systems,


Data

Hard disks can fail unexpectedly. To avoid data loss, many systems implement a Redundant


Network

For a server to work, it must be connected to the other computers on the network. There are


Site

If a major catastrophe were to happen, it's possible your building o


Power

Computers need a constant supply of electricity to work. To pro


Failover

As seen in the previous examples, having redundancy can be very beneficial. An important


10.6.5 Install a UPS (Demo Video) Transcript:

This scenario, you'll add an uninterruptible power supply, or UPS, to a desktop computer system. To start, we'll add the UPS to the workspace. Open the Outlets menu on the shelf and drag the UPS out until you see this yellow outline. To plug the UPS into the wall outlet, select the UPS and drag its connector to the outlet. To turn the UPS on, press its power button.

If we zoom in on the UPS, we can see two rows of outlets. The top row offers battery backup and surge protection, and the bottom offers surge protection without battery backup.

Now let's connect the computer and monitor to the UPS. Click each power cord in the partial connections area and drag the male ends to the top row of the UPS.

Next, we'll plug in the printer. Click the printer to select it, then drag its cable to the bottom row of the UPS.

Next, we want to connect the network through the UPS. This will allow network administrators to remotely monitor the status of the UPS. Right now, the computer is connected directly to the wall plate. We'll start by unplugging the cable from the wall by dragging it away. Switch to the side view of the UPS. Here, we see two RJ-45 ports. The Network In port needs to connect to the wall, and the Network Out port needs to connect to the computer. Drag the cable we just unplugged to the Network Out port.

Expand the Cables menu on the shelf and select the Cat6a cable. Drag one end to the Network In port and the other end to the wall plate.

Finally, we'll set up a USB connection between the computer and the UPS. With this cable in place, the UPS can send a message to the computer when there's a power loss. Click the USB cable on the shelf. Drag the Type B connector to the port on the UPS. Switch to the back view of the computer and drag the Type A connector to an available USB port.

10.6.6 Install a UPS (Simulation) Scenario

You are the IT administrator for a small corporate network. The area around your office complex is under construction. The power company informed you that there may be short interruptions to electrical service that could last up to 15 minutes. You need to add a UPS to the workstation and monitor in Office 1 so that work can be saved in the event of an outage.

A UPS protects against over and undervoltage conditions. The battery included with the UPS provides backup power in case the main power is lost.

In this lab, your task is to complete the following:

• Add a UPS for your computer:


• Plug the UPS into the wall outlet and turn it on.


• Plug the computer and monitor power cables into the battery backup outlets on the UPS.


• Plug the printer into a surge protection-only outlet on the UPS.


• Connect the network cables through the UPS to the computer. The cable from the wall connects to the IN port.


• Connect the USB cable to the UPS and the computer.


Explanation

In this lab, your task is to complete the following:

• Add a UPS for your computer:


• Plug the UPS into the wall outlet and turn it on.


• Plug the computer and monitor power cables into the battery backup outlets on the UPS.


• Plug the printer into a surge protection-only outlet on the UPS.


• Connect the network cables through the UPS to the computer. The cable from the wall connects to the IN port.


• Connect the USB cable to the UPS and the computer.


Complete this lab as follows:

1. Add a UPS to the Workspace as follows: a. On the Shelf, expand Outlets .


b. Drag the UPS from the Shelf to the Workspace.


2. Plug the UPS into the wall outlet and turn on the UPS as follows: a. Under Selected Components, drag the power plug to a power outlet on the wall plate.


b. Click the power button on the UPS to turn on the battery backup.


3. Plug the computer and monitor into the appropriate power outlets as follows: a. Under Partial Connections for the computer, select the power cord .


b. Under Selected Component, drag the AC Power Connector (Male) to a battery backup outlet on the top of the UPS.


c. Under Partial Connections for the monitor, select the power cord .

d. Under Selected Component, drag the AC Power Connector (Male) to a battery backup outlet on the top of the UPS.


4. Plug the printer into the appropriate power outlets as follows: a. Select the printer in the Workspace.


b. Under Selected Component, drag AC Power Connector (Male) to a surge protected outlet on the bottom of the UPS. Printers typically require more power than can be supplied by the battery backup portion of a UPS.


5. Connect to the network through the UPS as follows: a. Above the surge protector, select Side to switch to the side view of the UPS.


b. Select the Cat6a cable connected to the network port on the wall plate.


c. Drag the RJ45 Shielded Connector from the wall plate to the Network OUT port on the UPS to add protection to the network connection. The OUT port connects to the computer.


d. On the Shelf, expand Cables .


e. Select the Cat6a Cable .


f. Under Selected Component, drag the RJ45 Shielded Connector to the Network IN port on the UPS.


g. Under Selected Component, drag the unconnected RJ45 Shielded Connector to the network port on the wall plate.


6. Connect the USB cable to the UPS and the computer as follows: a. Above the computer, select Back to switch to the back view of the computer.


b. On the Shelf, select the USB cable .


c. Under Selected Component, drag the USB Type B connector to the USB port on the UPS.


d. Under Selected Component, drag USB Type A connector to an open USB port on the computer to allow the UPS to communicate with the computer. The USB cable allows the UPS to send signals to the computer to shut down when the battery is low.


e. Above the computer, select Front to switch to the front view of the computer.


f. Click the power button on the monitor to make sure power is connected.


g. Click the power button on the computer.


If the UPS is on, you can disconnect the plug on the UPS from the wall to verify that the computer and the monitor

remain on and have power from the battery.

10.6.7 RAID Implementations

The acronym RAID stands for redundant array of independent disks. The word redundant is there because in a RAID system, the same data is stored across multiple hard drives. This kind of setup has many advantages, such as helping avoid data loss and improving the overall performance of your system. RAID was first implemented in the late 1980s when developers realized they could get better performance with an array of inexpensive drives rather than with a single expensive one.

What Is a RAID?


RAID 5: Multiple smaller data divided amongst four larger disks creating a RAID. Illustration.

Simply put, a RAID is a way to combine smaller and less-expensive disks (that would usually function independently of each other) into a single unit that works together. This combination of disks is known as an array. Arrays can be stacked in different ways with the goal being to maximize the following characteristics:

• Fault-tolerance : This describes the degree to which the array can survive one or more disk failures. This helps to protect the data that's stored inside.


• Performance : This describes the degree to which the read/write capacity of the array is greater than an individual disk. This helps boost overall system performance.


• Capacity : This describes the amount of data that can be stored across all the disks of the array. This helps increase system storage capacity.


Striping, Mirroring, and Parity

There are a few terms you should learn in order to better understand RAID arrays. Any RAID setup you'll encounter utilizes one or more of the following terms.

Striping means splitting the flow of data into blocks of a certain size and then writing these blocks across the array one by one. The blocks are stored across different drives in the array, giving the image of a stripe of data that covers multiple drives. Striping can help improve the overall performance of your system.


RAID 0: Striping example in which blocks of data are stored across the array one by one. Illustration.

Mirroring means that the RAID array stores identical copies of data across different drives at the same time. This ensures that if one of the drives fails, you don't lose important data because it's backed up on other drives in the array.


RAID 1: Mirroring example in which multiple identical copies of data are stored across the drives. Illustration.

Parity is another way to help protect against data loss, in which data can be recalculated with the help of other drives if one fails.

What Is a RAID Controller?

A RAID controller is a card inside of the computer that manages the different hard disks or solid-state drives (SSDs) that work together in the RAID array. Sometimes, this job can be undertaken by a software program, though software RAID setups are often not as powerful as versions created with hardware.

RAID Levels

There are several levels of RAID implementations which are just different setups that can be used in a RAID format. RAID 0, RAID 1, RAID 5, and RAID 6 are the most common types of RAID implementations.

• RAID 0 : evenly assigns data across at least two disks without parity information, redundancy, or fault tolerance. It uses striping to increase computer performance.


• RAID 1 : makes a copy of all data on at least two disks (redundancy), but doesn't have parity information, striping, or spanning disk space across multiple disks. It uses mirroring to provide some protection and sometimes increases data speed.


• RAID 2 : distributes the data evenly in bits rather than in data blocks.


• RAID 3 : incorporates byte-level striping with a parity disk.

• RAID 4 : incorporates block-level striping with a parity disk.


• RAID 5 : assigns data across two or more disks with distributed parity and striping. It provides increased performance and can survive the loss of a member disk. RAID 5 requires at least three disks (two for data and one for parity).


• RAID 6 : the same as RAID 5 but with an extra parity block. It also increases performance and can survive the loss of a disk.


10.6.8 Create RAID Arrays (Demo Video) Transcript:

In this lab, you'll configure volumes on a RAID, or redundant array of independent disks. If we look at the drive bays, we can see that this computer has five disks installed. On the computer, these disks are numbered 0 through 4.

To start, we need to turn on the computer by pressing the power button. Once the computer turns on, right-click Start and select Disk Management. Click OK to initialize the disks.

Now that the disks are initialized, we can create partitions. First, we want to create a striped volume on disks 1 and 2. Disk striping, or RAID level zero, improves disk performance, but does not provide any fault tolerance. Right-click disk 1 and select New Striped Volume. This launches a wizard that will help us with the rest of the setup. Click Next. Since we want the volume to be on disks 1 and 2, we'll add disk 2, then click Next. Assign the drive letter E, then click Next. Format the volume with the NTFS file system and enter Editing as the volume label. Click Next, then click Finish. When it asks if you're sure, click Yes.

Next, we want to create a mirrored volume on disks 3 and 4. Disk mirroring, or RAID level one, provides fault tolerance by including an exact copy of the data on two or more disks. Right-click disk 3 and select New Mirrored Volume. Click Next. Add disk 4, then click Next. Assign the drive letter M, then click Next. Change the volume label to Media. Click Next, Finish, then Yes.

10.6.9 Create RAID Arrays (Simulation) Scenario

You're building a new computer that will be used for video editing and storing pictures. You have installed the operating system on Disk 0 and then installed four SATA hard drives. You want to have the following additional volumes:

• A volume to be used for storing raw video files for editing. This volume needs to be optimized for performance.


• A volume to be used for storing digital photos and completed video files. This volume needs to provide fault tolerance so that a failure in one drive will not affect the availability of the files.


In this lab, your task is to create and format these two volumes:

1. Turn on the computer.


2. Run Disk Management and initialize the four new disks using MBR as the partition style.


3. Create a new striped volume (RAID0) using all of the space on Disk 1 and Disk 2. o Drive letter: E


o Volume format: NTFS


o Volume label: Editing


4. Create a mirrored volume (RAID1) using all of the space on Disk 3 and Disk 4. o Drive letter: M


o Volume format: NTFS


o Volume label: Media

Explanation

In this lab, your task is use Disk Management to create and format the following volumes:

• The Editing volume as a striped volume (RAID0) using all of the space on Disk 1 and Disk 2.


• The Media volume as a mirrored volume (RAID1) using all of the space on Disk 3 and Disk 4.


• Format all volumes using NTFS.


Complete this lab as follows:

1. Create a striped volume as follows: a. Click the power button to turn on the computer.


b. Right-click Start and select Disk Management .


c. Make sure MBR is selected as the partition style.


d. Select OK to initialize all disks.


e. Maximize the window for easier viewing.


f. Right-click Disk 1 and select New Striped Volume .


g. Click Next .


h. Under Available, select Disk 2 .


i. Select Add . What will be the total capacity of the new volume?


j. Click Next .


k. From the Assign the following drive letter drop-down list, select E .


l. Click Next .


m. Make sure NTFS is selected as the file system.


n. In the Volume label, enter Editing .


o. Click Next .


p. Click Finish .


q. Click Yes to convert the disks to dynamic disks.


a. Right-click Disk 3 and select New Mirrored Volume .


b. Click Next .


c. Under Available, select Disk 4 .

d. Select Add . What will be the total capacity of the new volume?


e. Click Next .


f. From the Assign the following drive letter drop-down list, select M .


g. Click Next .


h. Make sure NTFS is selected as the file system.


i. In the Volume label, enter Media .


j. Click Next .


k. Click Finish .


l. Click Yes to convert the disks to dynamic disks.


2. Create a mirrored volume as follows:


10.6.10 Backup Considerations (Lesson Video) Transcript:

Most of us understand the vital importance of backing up data files. All it takes is one terrifying experience of losing a document because of a corrupt disk or a software bug. But many of us are still too lazy or too busy to back up our personal data consistently. In this video, we'll discuss how different types of data require different backup processes. We'll also talk about why IT administrators store backups in different locations.

Electronic data files can easily become corrupted, lost, or destroyed, especially when a storage device fails. They can also be deleted or modified by users accidentally. But electronic data is easy to back up. With a backup process in place for data files, users can be prepared for just about anything. Ad hoc backups, which are unscheduled and done periodically, are certainly better than nothing.

But for businesses that rely heavily on stored data and information, regularly scheduled, daily backups are essential. These are usually scheduled each evening to avoid any work disruption during the day. While individual users can install and use their own external hard drives or other backup systems, most businesses require users to store important files on network servers. These servers can be backed up efficiently through data redundancy, replication, and traditional backup systems.

A good option for many home and office networks is to install a NAS, or Network Attached Storage, device. These devices contain one or more hard drives that users can access over the network. NAS drives can be used for file sharing, backups, and even streaming media.

In addition to backing up data files, it's important to back up system software as well. These backups are particularly important before installing new applications on a system or making significant system configuration changes.

Maintaining a regular backup process for an entire computer system is a bit more complicated than simply copying selected folders or files to a disk. System backups typically begin by capturing a full image of a disk at a certain point in time. Since most of the operating system, applications, and other files will not change much from day to day, the next step is to perform incremental backups that include only files that have been added or modified since the last backup.

If a system fails, users can restore system files by using the last full backup and then all incremental backups since that point in time.

Database servers require a different sort of backup process. Because enterprise databases are constantly in use, database backups need to account for transactions that may not have been fully committed when the backup was created. These backups are typically performed by database management systems.

In addition to full backups of all data at specific points in time, databases require two other types of backup. Differential backups include only the data that has changed since the last full backup. Transaction log backups allow administrators to restore a database to a particular moment in time by rolling back transactions and preserving database integrity.

Now, let's talk for a minute about where backups are stored. For convenience, administrators often store backups locally – in the same building or even the same room as the computer systems they're backing up. This allows data to be restored quickly if a storage device or system fails or if a user unintentionally deletes a critical file. However, organizations need to be prepared for more widespread failures, such as natural disasters.

This is why it's important to store copies of critical business data off-site. Business continuity and disaster recovery plans always need to account for the local destruction of data and devices. Traditionally, offsite backups are stored on tape cartridges within a tape vault. The location of these backups needs to be far enough from a possible natural disaster, while being close enough to recover the data and systems within a reasonable amount of time.

The emergence of cloud storage has changed the way many businesses backup their data. In some cases, cloud storage can fulfill the requirement for offsite backups. Cloud storage provides a convenient, flexible, and scalable alternative to traditional backup methods. One disadvantage of using the cloud is that a remote backup requires a lot of network bandwidth and a reliable Internet connection. Cloud backups and restores may take significantly longer than using local storage devices.

In this video, we learned about different types of data backups, including critical data, system, and database backups. We also talked about the importance of storing some backups off-site in case of theft or natural disaster. And we discussed the advantages and disadvantages of backing up files using cloud storage.

10.6.11 Backup Facts

Most people understand the importance of backing up data files. Recreating a document is costly and no fun, especially when the loss is due to a user error or corrupt disk. However, many users don't back personal data consistently.

This lesson covers the topic of backup considerations. Backup Considerations

Electronic data is easy to back up. To back up a file, means to make a copy of it in another location. You can retrieve the backup file if it is needed to restore the information.

The following table outlines how the types of data require different backup processes and why IT administrators store backups in different locations.

Table 1: Backup Considerations Term

Description


Critical data

The data that is most important to you or your company is considered to be critical data. It


Data file

Electronic data files can easily become corrupted, lost, or destroyed, especially when a


Ad hoc

Ad hoc backups are unscheduled backups performed periodically. They are better than no


Regular

Regularly scheduled, daily backups are essential for businesses


Bare metal

Most backups back up only data, such as files. A bare metal ba


Network

A good option for many home and office networks is to install a Network Attached Storage


System

In addition to backing up data files, it's important to back up system software as well. These


Database

Database servers require a different sort of backup process. Because enterprise databases


Local backups

For convenience, administrators often store backups locally. The backups are in the same


Off-site backups

Business continuity and disaster recovery plans always need to account for the local


Cloud storage The emergen


Restoring T


10.6.12 Use Backup Software (Demo Video) Transcript:

In this scenario, you'll create a backup for your files on a Windows computer. Backing up your data is a good way to prevent data loss due to corrupted files or damaged hardware.

Open the settings app by clicking Start, then clicking this gear icon. We'll maximize the window to make it easier to see. Click Update & Security, then Backup.

First, we need to select which drive we want to store our backup files. Click the plus icon, then select the E drive. Make sure the switch to automatically back up files is set to on.

Now, we can customize our backup schedule. Click More options. Use these dropdowns to back up files daily and keep backups for six months.

Finally, we need to tell the system which files we want backed up. Click this plus icon, navigate to the D drive, then click Choose this folder.

Now we're ready to run the backup by clicking Back up now. On a real system this could take a few hours, but for this simulation it'll finish in a few seconds.

10.6.13 Use Backup Software (Simulation) Scenario

You recently upgraded the Exec computer from Windows 8 to Windows 10. To protect valuable data, you need to implement backups on this computer.

In this lab, your task is to configure automatic backups for the Exec computer as follows:

• Save the backup to the Backup (E:) volume.


• Back up files daily .


• Keep backup files for 6 months .


• Back up the entire Data (D:) volume.


• Make a backup now.


Explanation

Complete this lab as follows:

1. Access the Backup options. a. Right-click Start and then select Settings .


b. Select Update & security .


c. From the left pane, select Backup .


2. Configure and run a backup plan. a. From the right pane, select Add a drive .


b. Select Backup (E:) .


c. Under Automatically back up my files , slide the switch to On .


d. Select More options .


e. Under Back up my files , use the drop-down to select Daily .


f. Under Keep my backups , use the drop-down to select 6 months .


g. Under Back up these folders , select Add a folder .


h. Double-click the Data (D:) volume and then select Choose this folder .


i. Select Back up now .


j. Wait for the completion of the backup.


10.6.14 Configure File History (Demo Video) Transcript:

In this lab, you'll enable File history on a Windows 10 system. This feature takes regular snapshots of your files, tracking changes you make to the files over an extended period of time. First, open the Settings app by clicking Start, then the gear icon. Click Update & Security, then Backup. Click the plus next to Add a drive, then click the D drive. Click More options. Use the dropdowns to back up files every fifteen minutes and keep the backups for six months.

10.6.15 Configure File History (Simulation) Scenario

The employee in Office1 is responsible for developing an important new advertising campaign. To protect her data, you've decided to enable File History on her Windows 10 system and configure it to take frequent snapshots of her files. In this lab, your task is to complete the following:

• Enable File History on the Data (D:) volume.


• Configure File History to save copies of files every 15 minutes.


• Retain previous versions of files for 6 months.


Explanation

Complete this lab as follows:

1. Access the File History options. a. Right-click Start and then select Settings .


b. Select Update & security .


c. Select Backup .


2. Turn on and configure File History backups for the Data drive. a. Select Add a drive .


b. Select Data (D:) .


c. For Automatically back up my files , slide the switch to On .


d. Select More options .


e. Configure the following: . Back up my files: Every 15 minutes


. Keep my backups: 6 months


10.6.16 Restore Data from File History (Demo Video) Transcript:

In this lab, you want to restore two files to previous versions. Keep in mind that this will only work if you've already enabled file history on your computer.

First, open the Settings app by clicking Start, then the gear icon. Click Update & Security, then Backup, then More options.

At the bottom of the Backup options dialog box, select Restore files from a current backup. This opens the File History dialog box, where we can find and restore previous versions of our files. Use this arrow to go back to the

11:15 AM versions of the files. Double-click Pictures, then Layouts, then select the image file. Click this green button to restore this version of the file to your file system, replacing the file that's already there.

Back in the File History dialog box, click this up arrow to go back to the Pictures directory. Use the left arrow to go to the 12:15 PM backup. Open the Images folder, then select the brochure file. Once again, click the green button to restore this version of the file to your file system, replacing the file that's already there.

10.6.17 Restore Data from File History (Simulation)

Scenario

Susan produces your organization's monthly magazine. While working on an upcoming issue, Susan accidentally deleted significant portions of the layout image. She also made extensive changes to the artwork for a marketing brochure, but has now been asked to discard the changes and use the original design.

Susan has asked you to help her recover older versions of her files in the Pictures library so she can still meet her publishing deadlines.

In this lab, your task is to complete the following:

• Restore the Pictures\Layouts\June2020_Issue.jpg file to the version that was last modified on Monday, March 16, 2020 11:15 AM.


• Restore the Pictures\Images\brochure.jpg file to the version that was last modified on Monday, March 16, 2020 12:15 PM.


Explanation

Complete this lab as follows:

1. Access the File History options. a. Right-click Start and then select Settings .


b. Select Update & Security .


c. From the left pane, select Backup .


d. Make sure Automatically back up my files is set to On .


e. Select More options .


2. Restore the June2020_Issue.jpg file. a. Scroll to the bottom of the Backup options dialog and select Restore files from a current backup .


b. Maximize the window for better viewing.


c. From the bottom of the File History dialog, select the Previous version button (left arrow) to navigate to the backups captured on Monday, March 16, 2020 11:15 AM .


d. Double-click Pictures .


e. Double-click Layouts .


f. Select the June2020_Issue.jpg file.


g. Select the green Restore to original location arrow located at the bottom center.


h. Select Replace the file in the destination . The Layouts folder where the file was restored is opened.


i. From the Layouts folder, right-click the June2020_Issue.jpg file and then select Properties .


j. Verify that the file is 115.44 MB in size and was last modified on March 16, 2020 at 11:15:12 AM .


k. Select OK .


l. Close the Layouts window.

3. Restore the brochure.jpg file. a. In the top left of File History , select the up arrow to navigate to the Home\Pictures folder.


b. Select the Previous version button at the bottom to navigate to the backups captured on Monday, March 16, 2020 12:15 PM .


c. Double-click Images .


d. Select the brochure.jpg file.


e. Select the green Restore to original location arrow located at the bottom center.


f. Select Replace the file in the destination .


g. Right-click the brochure.jpg file and select Properties .


h. Verify that the file is 1.19 MB in size and was last modified on March 16, 2020 at 12:15:12 PM


i. Select OK .


10.6.18 Disaster Recovery (Lesson Video) Transcript:

One of the most important aspects of a business continuity plan is disaster recovery. Businesses need to create and validate a plan for recovering and restoring critical functions after a catastrophic disaster or extended disruption. Disasters can include fires, earthquakes, and hurricanes. An example of an extended disruption is a denial-of-service attack. In this video, we'll discuss how organizations prepare their IT infrastructure for disaster recovery.

A good disaster recovery plan needs to be informed by the other components of the business continuity plan. For example, a business impact analysis identifies critical business functions that need to be performed during disasters and other times of disrupted operations. Business executives prioritize critical business functions, spell out a recovery timeframe, and estimate the tangible and intangible impacts on the organization. A tangible impact would be financial loss. Intangible impacts are things like loss of customer trust.

Understanding the most critical business functions can help IT administrators prioritize which systems need to be restored first after a disaster. These might include email, financial systems, and CRM, or customer relationship management, systems.

In most cases, bringing mission-critical systems back online includes restoring databases needed by employees and customers. Essential data can be restored from backups that have been stored off-site or on the cloud. Another option would be to switch over to an alternate site that has replicated essential data and services. Data restoration plans need to verify that the data has not been have been corrupted and that replicated databases have been synchronized.

In addition to restoring data, disaster recovery plans include procedures on how to resume applications and restore access to data, hardware, communications, and other IT infrastructure.

Systems need to be brought back online carefully, in the proper sequence, to ensure that the core systems come up first. Once the disaster has concluded, plans need to be in place for reverting to the original site. To make sure the plan will be successful, it's important to conduct disaster recovery exercises that simulate real-world disasters.

In summary, an important part of a business continuity plan is disaster recovery for IT services. This includes prioritizing the most critical business functions, restoring data, and restoring system access.

10.6.19 Disaster Recovery Facts

One of the most important aspects of a business continuity plan is disaster recovery. Businesses need to create and

validate a plan for recovering and restoring critical functions after a catastrophic disaster or extended disruption. Disasters can include fires, earthquakes, and hurricanes. An example of an extended disruption is a denial-of-service attack. The table below summarizes how organizations prepare their IT infrastructure for disaster recovery.

Table 1: Disaster Recovery TERM

DESCRIPTION


Business continuity plans

A good disaster recovery plan needs to be informed by the other components of the business continuity plan. For example, a business impact analysis identifies critical business functions that need to be performed during disasters and other times of disrupted operations. Business executives must prioritize critical business functions, spell out a recovery timeframe, and estimate the tangible and intangible impacts on the organization. A tangible impact would be financial loss. Intangible impacts are things like loss of customer trust.


Prioritization

Understanding the most critical business functions can help IT administrators prioritize the systems that need to be restored first after a disaster. These might include email, financial systems, and customer relationship management systems (CRM).


Restoring data

In most cases, bringing mission-critical systems back online includes restoring databases needed by employees and customers. Essential data can be restored from backups that have been stored off-site or on the cloud. Another option would be to switch over to an alternate site that has replicated essential data and services. Data restoration plans need to verify that the data have not been have been corrupted and that replicated databases have been synchronized.


Restoring access

In addition to restoring data, disaster recovery plans include procedures on how to resume applications and restore access to data, hardware, communications, and other IT infrastructure. Systems need to be brought back online carefully, in the proper sequence, to ensure that the core systems come up first. Once the disaster has concluded, plans need to be in place for reverting to the original site. To make sure the plan will be successful, it's important to conduct disaster recovery exercises that simulate real-world disasters.


10.6.20 Section Quiz (Section Quiz) q_itf_confidentialInfo_facts_01

Match each security policy on the left with the appropriate description on the right. Answers:

• Organizational Security Policy


• Password Policy


• Code of Ethics


• Acceptable Use Policy


Explanation:

An Organizational Security Policy is a high-level overview of the organization's security program.

An Acceptable Use Policy (AUP) defines an employee's rights to use company property. The AUP should also set expectations for user privacy when using company resources.

Password Policy identifies the requirements for passwords used to authenticate to company-owned systems. For

example, this policy may specify that user accounts should be disabled or locked out after a certain number of failed login attempts.

q_itf_confidentialInfo_facts_02

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information.

To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Answers:

• *Use data wiping software to clear the hard drives


• Delete user data and applications from the hard drives


• Reformat the hard drives


• Include the original operating system discs and product keys with the computers


Explanation:

Data wiping software will sanitize or clean a device by removing all data remnants. Sanitization is necessary because deleting, overwriting, and reformatting (even multiple times) does not remove all data remnants. Sanitization securely removes sensitive data from storage media and is designed to solve the data remanence problem for devices that will be reused. It is the best way to remove Personally Identifiable Information (PII) from a hard disk before reuse.

Deleting data and applications from the hard drives or reformatting the drive will not permanently remove data from the system. Many tools can recover deleted files.

q_itf_confidentialInfo_facts_03

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues.

Which of the following is the BEST action to take? Answers:

• *Ignore the paper and tell no one of its contents.


• Give your friend a heads up about what you found, but don't disclose from where you heard the information.


• Tell your friend about the report you saw and whose desk it was on.


• Tell your fellow PC technicians about what you saw and let them decide what to do with the information.


Explanation:

You should ignore the paper and tell no one of its contents. Complete confidentiality is expected for any sensitive information that may be found in an employee's office. It is never appropriate to share sensitive, work-related information found in an employee's office with anyone in a company.

q_itf_confidentialInfo_sensitive

Meredith is a medical office manager for a clinic and is training a new employee in handling highly sensitive information. Which of the following could Meredith use as examples of high-level information that should not be shared? (Select two.)

Answers:

• *A patient's medical record


• *Clinic employees' home addresses


• Prescription medication side effects

• Contracts with medical vendors


• Dissatisfaction with a doctor in the clinic


Explanation:

A patient's medical record is an example of highly sensitive information that should be protected.

Clinic employees' home addresses are examples of highly sensitive information that should be protected.

Sharing prescription medication side effects is an example of low sensitivity, as it is publicly available to anyone. Contracts with medical vendors are examples of medium-sensitivity information, as any issues could possibly result in significant harm to the vendor-client relationship and a withdrawn contract.

Sharing employee dissatisfaction with a doctor is an example of medium sensitivity. Although true, it could cause personal embarrassment to the doctor.

q_itf_faulttolerance_facts_01

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times? Answers:

• *Redundancy


• Backup


• Replication


• Cloud storage


Explanation:

Redundancy provides fault tolerance through duplication that helps keep a system available even after a component failure. There are three main types of redundancy: data, network, and power.

Backup provides a copy of data; however, backups take time to restore and do not always keep a system online and accessible.

Replication is a backup method that provides fault tolerance but typically requires an additional system to take over operations.

Cloud storage provides a means to access data from most locations, but it does not provide a solution to keep a system online.

q_itf_faulttolerance_fault

A systems engineer is part of a company team creating a business continuity plan to recover critical data in case of a natural disaster.

Which of the following fault tolerance methods should the team include in the plan to be able to recover data? (Select two.)

Answers:

• Power redundancy


• *Site redundancy


• *Replication


• Redundant Array of Independent Disks (RAID)


• Data Center


Explanation:

Site redundancy provides a complete duplicate of another location's computers and data. This is useful in the case of a major catastrophe, such as an earthquake or tornado, away from your main business location.

Replication is a data redundancy strategy where data is copied to a different physical location. This strategy works well in the case of a major catastrophe, such as an earthquake or tornado.

Power redundancy protects against service or data loss due to a power outage. However, if servers are destroyed during a natural disaster, power redundancy does not help to recover critical data.

Redundant Array of Independent Disks (RAID) is designed to store a duplicate of the same data on two or more disks simultaneously. If one disk fails, the data can still be accessed by using one of the other disks. However, this fault tolerance strategy does not address a natural disaster in which the entire RAID array is destroyed.

A data center is an area used to store and share such things as computer systems, applications, and data. However, during a natural disaster, a data center can be completely or partially destroyed.

q_itf_faulttolerance_redundancy_01

A systems engineer is maintaining a large network. A critical financial application service is down, and the issue has been escalated to the engineer. They've discovered that the network server hard disk from which the service is running has failed.

Which of the following would help the systems engineer make sure that this is not an issue in the future? Answers:

• *Data redundancy


• Network redundancy


• Site redundancy


• Power redundancy


Explanation:

Data redundancy often uses a RAID (Redundant Array of Independent Disks) to store all system data on two or more disks at the same time. If one disk fails, the data can still be accessed by using the other disk(s). This would help solve the issue of the financial application service going down.

Network redundancy ensures that a server has more than one connection to the network (such as installing multiple network interface cards). If one connection fails, the second connection can be used. However, this would not solve the issue of a disk failure.

Site redundancy provides a complete duplicate of another location's computers and data. However, it does not practically solve the issue of a hard drive failure leading to a service going down.

Power redundancy protects against data or service loss from power outages. However, it does not solve the issue of a server hard disk going down.

q_itf_faulttolerance_redundancy_02

A systems engineer wants to set up an array of hard disks with the same service (and its associated data) stored on each disk. If one disk fails, the service can still be accessed by another hard disk in the array.

Which of the following BEST describes this type of fault tolerance strategy? Answers:

• *Data redundancy


• Network redundancy


• Site redundancy


• Power redundancy


Explanation:

Data redundancy avoids data loss by implementing a system (such as RAID) where the same data is stored on two or more disks simultaneously. If one disk fails, the data can still be accessed by using one of the other disks.

Network redundancy provides a server with more than one connection to the network (for example, installing multiple network interface cards). If one connection fails, the server can use the second connection. However, this fault tolerance

strategy is not designed to solve the problem of a hard disk failure.

Site redundancy provides a duplicate of another location's computers and data. This is useful in the case of a major catastrophe, such as an earthquake or tornado, at your main location. However, this fault tolerance strategy is not designed to solve the problem of a hard disk failure.

Power redundancy protects against service or data loss due to a power outage. It is not designed to solve the problem of a hard disk failure.

q_itf_backup_cloud

Which of the following can often fulfill a company business requirement for offsite backups in case of a natural disaster or criminal activity?

Answers:

• *Cloud storage


• Bare metal backups


• Local backups


• Network attached storage (NAS)


Explanation:

In some cases, cloud storage can fulfill the requirement for offsite backups. This is because it provides a convenient, flexible, and scalable alternative to traditional backup methods in the case of a natural disaster (such as a fire) or criminal activity (such as a theft).

Bare metal backups let you restore an entire computer, including the operating system, without requiring any software to be preinstalled. However, a bare metal backup has no requirement for offsite storage.

For convenience, administrators often store backups locally in the same building or even the same room as the computer systems they're backing up. Local backups do not provide for offsite storage requirements.

Network attached storage (NAS) is a device with one or more hard drives used for file sharing, backups, and even media streaming. However, an NAS device is a local (not an offsite) backup solution.

q_itf_backup_contingency

Which of the following contains procedures and processes for mitigating vulnerabilities in systems that support critical company workflow and resources?

Answers:

• *Contingency plans


• Business continuity plans


• Action plan


• Enterprise resource plan


Explanation:

Besides creating a business continuity plan to identify critical workflow and resources, companies often create a contingency plan that provides requirements for mitigating vulnerabilities in the systems these store these operations. A contingency plan is the document that contains processes and procedures for mitigating those vulnerabilities.

An action plan is part of a troubleshooting process and does not focus on mitigating vulnerabilities in systems that support critical workflow and resources.

Enterprise resource planning (ERP) integrates business operations and manages the flow of data between various departments. It does not focus on mitigating vulnerabilities in systems that support critical workflow and resources. q_itf_backup_critical

A systems administrator has been given the task of backing up critical data on a network server. Which of the following should the administrator consider as critical data? (Select two.)

Answers:

• *Company contracts


• Marketing images


• Company newsletters


• Third-party application installation files


• *Settings files


Explanation:

In addition to the actual files that need to be backed up, you may also need to back up other critical settings files, which are sometimes stored in other locations than where the normal files are stored.

Contracts are a vital part of expense accounting and revenue generation for a company. They should be considered critical data.

Images used by the marketing department are important for creating and maintaining marketing documents and websites, but they can be recovered without the need to re-create them.

Company newsletters are important for communicating information to employees, but they are not critical data, as the newsletter information is based on other sources.

Installation files for third-party programs are available from other sources outside the company. q_itf_backup_facts_01

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.

Which of the following steps have you forgotten in your troubleshooting process? Answers:

• *Perform a backup.


• Implement the solution.


• Verify system functionality.


• Create an action plan.


Explanation:

You need to perform a backup before making changes. The backup could be used to restore current settings or data in the event of additional issues resulting from the troubleshooting process. You have already established a probable cause and created an action plan. Verifying and documenting the solution occurs after the problem has been resolved. q_itf_backup_facts_02

Why should backup media be stored offsite? Answers:

• To reduce the possibility of theft.


• It is required by government regulations in the USA.


• *To prevent the same disaster from affecting both the system as well as its associated backup media.


• It improves the efficiency of the restoration process.


Explanation:

Backup media should be stored offsite to prevent the same disaster from affecting both the system itself as well as its associated backup media. For example, if your primary facility is destroyed by flood or fire, then your data remains

protected at an offsite location.

Offsite storage does not significantly reduce the possibility of media theft because it can be stolen while in transit and while at the remote storage location. Offsite storage is not mandated by government regulation. Offsite storage does not improve the efficiency of the restoration process because additional time will be spent maintaining the backup media at the remote location.

q_itf_backup_facts_03

Which of the following is typically used for large data backups of servers? Answers:

• *DLT tape


• CD-R


• DVD-R


• RAID


Explanation:

DLT tape systems are used primarily for backups. The large storage capacity of these systems makes them ideal for server backups. CD-R and DVD-R do not provide sufficient storage capacity for server backups. RAID is a data protection method that preserves data on hard disks if one disk in a set fails. It is not considered a backup mechanism. q_itf_backup_facts_04

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location.

Where would be the next best place to keep your backup media? Answers:

• In a locked room.


• On a shelf next to the backup device.


• *In a locked fireproof safe.


• In a drawer in your office.


Explanation:

If you can't store backup tapes at an offsite location, you should make sure that the backup tapes are locked up (for security) and that measures are taken to protect the tapes from a disaster (such as a fire).

Strategies such as locking the tapes in a different room, keeping them on a shelf, or storing them in a drawer do not address both concerns.

q_itf_backup_facts_05

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Answers:

• *Configure your device to remotely backup important data to the Cloud.


• Configure your device to backup important data to your personal computer.


• Don't put important information on your mobile device.


• Only use apps, such as email apps, that store data on the app provider's servers.

Explanation:

The surest way to prevent the loss of important information on your mobile device is to configure your device to remotely backup important data to the Cloud.

Backing up data to your personal computer is not a bad idea, but if there's a natural disaster, your data is safer in the Cloud than it is on a single machine that could be damaged in the same disaster that affects your mobile device. Not putting important information on your mobile device is a practical impossibility, as is only using apps that store data (like messages in gmail) on the app provider's servers.

q_itf_backup_facts_06

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset.

Which of the following actions should a technician take before doing so? Answers:

• *Backup all data to an attached computer or a cloud backup service.


• Perform a remote wipe to clear any personal data.


• Close all running applications.


• Ensure that the battery is fully charged.


Explanation:

A factory reset will clear all data from the mobile device. To prevent the loss of this data, it should be backed up to an attached computer or a cloud backup service.

A remote wipe will clear all personal data which will be lost if it has not been backed up. All running applications will be closed and overwritten during a factory reset.

A factory reset can be done whether the battery is fully charged or not. q_itf_backup_facts_07

What is a disadvantage of using the cloud for data storage? Answers:

• *Cloud storage backups require a reliable internet connection.


• Cloud storage allows you to save files to the internet.


• You can access files from any computer with an internet connection.


• Cloud storage can fulfill the requirements for offsite backups.


Explanation:

While cloud storage is usually convenient, scalable, and cost-effective, the fact that it requires a reliable internet connection can be a disadvantage in some disaster recovery scenarios.

Being able to save and access files via the internet is usually an advantage of cloud storage. Using cloud storage for offsite backups can also be a benefit.

q_itf_backup_facts_08

You have configured your Windows systems to automatically backup user data every night at midnight. You also take a system image backup once a month.

In addition, which of the following would MOST likely ensure that you are protected against data loss? (Select TWO). Answers:

• *Regularly test restoration procedures.


• Restrict restoration privileges to system administrators.


• Write-protect all backup media.

• *Store a copy of all backups off-site.


• Configure System Maintenance to automatically defragment system hard drives every night.


Explanation:

The only way to ensure that you are protected against data loss is to regularly test your restoration procedures. This activity will reveal whether or not your backup process is functioning properly and whether or not your restoration procedures will actually work. You should also store a redundant copy of your backups at an offsite location. That way, a disaster that affects your main site will (hopefully) not affect the offsite backups.

Restoration privileges should be restricted to trusted staff to prevent confidentiality violations. However, this is a security issue and is not related to the issue of data restoration in this scenario. Write-protecting backup media will provide little protection for the stored data because it can be easily removed.

q_itf_backup_facts_09

Even if you perform regular backups, what must be done to ensure that you are protected against data loss? Answers:

• *Regularly test restoration procedures.


• Restrict restoration privileges to system administrators.


• Write-protect all backup media.


• Configure System Maintenance to automatically defragment system hard drives every night.


Explanation:

The only way to ensure that you have protection against data loss is to regularly test your restoration procedures. This activity will reveal whether or not your backup process is functioning properly and whether or not your restoration and recovery procedures are accurate. It is a good idea to store backup media in a fireproof vault, but it is a better idea to store it offsite. Restoration privileges should be restricted to trusted staff to prevent confidentiality violations. However, this does not address the issue of data-loss protection. Write-protecting backup media will provide little real security for the stored data because anyone can flip the switch on the media to remove the protection.

q_itf_backup_steps

Which of the following are required steps in a system backup process? (Select two.) Answers:

• Transaction log backups


• *Incremental backups


• Replication


• *Full disk image


• Ad hoc backups


Explanation:

System backups begin by capturing a full disk image from a certain point in time.

Once you capture a full disk image (as part of a system backup), the next step is to perform incremental backups. These include only files that have been added or modified since the last backup.

Transaction log backups are associated with backing up a database that uses a relational database management system (RDMS). They are not part of a system backup process.

Replication is a mirror copy of a database saved on a separate host. It is not a step in a system backup process.

An ad hoc backup is an unscheduled backup performed periodically, but it is not a step in a system backup process. q_itf_backup_transaction

You are backing up a database that uses a relational database management system (RDBMS). Which of the following do you need to back up in addition to the database's data?

Answers:

• *Transaction logs


• Incremental data


• Settings files


• Network attached storage (NAS)


Explanation:

RDBMSs use transaction logs that record all transactions and modifications made by each of them. When backing up a database, it is critical to also back up the transaction logs.

Incremental data refers to files that have been added or modified since the last backup. It is not associated with an RDBMS and transaction logs.

Settings files are critical data normally stored outside a database and are not associated with an RDBMS and transaction logs.

Network attached storage (NAS) is a device with one or more hard drives used for file sharing, backups, and even media streaming. However, an NAS device is hardware and not data associated with an RDBMS.

q_itf_disaster_exercises

A network administrator has successfully restored access to network data, hardware, and communications after a natural disaster and updated the disaster recovery plan.

Which of the following should the network administrator do before the next disaster occurs? Answers:

• Prioritize which systems need to be restored first.


• Perform a business impact analysis.


• *Conduct disaster recovery exercises.


• Estimate tangible and intangible impacts.


Explanation:

To make sure that the updated disaster recovery plan will be successful, it is important to conduct disaster recovery exercises that simulate real-world disasters.

While prioritizing which systems need to be restored first is a critical step in disaster recovery, prioritization should be decided before restoring data and conducting disaster recovery exercises.

A business impact analysis identifies critical business functions that need to be performed during disasters and other times of disrupted operations. However, it should be performed before any disaster occurs and the results included as part of the initial business continuity planning.

Business executives prioritize critical business functions, spell out a recovery timeframe, and estimate the tangible and intangible impacts on the organization. This is all part of business continuity planning. However, the network administration is responsible for conducting disaster recovery exercises.

q_itf_disaster_facts_01

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Answers:

• *Prioritization

• Business Plan


• Fault tolerance


• Cloud backups


Explanation:

This part of a disaster recovery plan is called prioritization. Understanding the most critical business functions can help IT administrators prioritize which systems need to be restored first after a disaster.

A business continuity plan has a much broader scope than simply prioritizing critical business functions.

While cloud backups and other fault tolerance measures are often part of data restoration plans, the order of restoration is spelled out by prioritizing critical business functions.

q_itf_disaster_recovery

A network administrator has verified the integrity of data restored from a backup to a network server and synchronized the data to a RAID system.

Which of the following is the next step in the disaster recovery process? Answers:

• *Restore normal user access to the data.


• Update the contingency plan.


• Prioritize which systems need to be restored first.


• Perform a business impact analysis.


Explanation:

After restoring data recovered from a backup, the next step in disaster recovery is to restore user access to the data, hardware, communications, and other IT infrastructure.

A contingency plan provides requirements for mitigating vulnerabilities in the systems that support workflow and resources. However, before making any updates to the contingency plan, a network administrator should make sure that user access is working properly.

While prioritizing which systems need to be restored first is a critical step in disaster recovery, prioritization should be decided before restoring and verifying the integrity of system data.

A business impact analysis identifies critical business functions that need to be performed during disasters and other times of disrupted operations. However, it should be performed before any disaster occurs and the results included as part of the business continuity plan.

10.7 Cybersecurity Careers Section Introduction

As you study this section, keep the following questions in mind:

• How does the work of security professionals affect my daily life?


• How can I prepare for a career in digital security?


This section describes common careers in cybersecurity. After finishing this section, you should be able to:

• Describe common careers in IT security, including systems administrator, computer forensics expert, and security analyst.


• Identify skills and educational requirements for IT security careers.

Key terms for this section include the following:

Term Definition


Systems Administrator

An IT professional who is responsible for securing networks and responding to intrusions.


Computer Forensics Expert

A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.


Security Analyst

A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.


10.7.1 Careers in Security (Lesson Video) Transcript:

Keeping businesses' data and information assets secure is one of the most important responsibilities of IT professionals. In this video, we'll introduce three popular cyber security careers: systems administrator, computer forensics expert, and security analyst.

In smaller organizations, a systems administrator is typically responsible for securing networks and responding to intrusions. They install and configure access controls, backups, and firewalls; monitor network performance; and detect unauthorized access. Systems administrators oversee company databases, email servers, and file systems. But one of their most important tasks is to monitor and maintain system security.

A computer forensics expert works closely with law enforcement officials to investigate security breaches, cyber attacks, and other crimes. They recover digital evidence such as emails and file metadata, some of which may have been damaged or deleted from storage devices. Forensics experts need to be thoroughly familiar with data encryption methods, operating systems, programming languages, and forensic software applications.

Information security analysts or engineers are in charge of designing and implementing security methods to protect an organization's computer systems and networks. In addition to installing firewalls and anti-malware protection, they research new threats and vulnerabilities, inspect the company's network for security breaches, and recommend measures to prevent future attacks. When necessary, they coordinate with law enforcement to investigate incidents. Security analysts understand and use ethical hacking techniques such as penetration testing and vulnerability assessment.

In this video, we introduced a few of the most popular careers in IT security. We looked at systems administrators, computer forensics experts, and security analysts. Top level IT security positions typically require a wide range of experience in managing company networks and investigating security incidents.

10.7.2 Security Career Facts

Keeping businesses’ data and information assets secure is one of the most important responsibilities of IT professionals. Top level IT security positions typically require a wide range of experience in managing company networks and investigating security incidents. The following table introduces three popular cyber security careers: systems administrator, computer forensics expert, and security analyst.

Table 1: Security Careers CAREER DESCRIPTION


Systems Administrator

In smaller organizations, a systems administrator is typically responsible for securing networks and responding to intrusions. They install and configure access controls, backups, and firewalls; monitor network performance; and detect unauthorized access. Systems administrators oversee company databases, email servers, and file systems. But one of their most important tasks is to monitor and maintain system security.

Computer Forensics Expert

A computer forensics expert works closely with law enforcement officials to investigate security breaches, cyber- attacks, and other crimes. They recover digital evidence such as emails and file metadata, some of which may have been damaged or deleted from storage devices. Forensics experts need to be thoroughly familiar with data encryption methods, operating systems, programming languages, and forensic software applications.


Security Analyst

Information security analysts or engineers are in charge of designing and implementing security methods to protect an organization's computer systems and networks. In addition to installing firewalls and anti-malware protection, they research new threats and vulnerabilities, inspect the company's network for security breaches, and recommend measures to prevent future attacks. When necessary, they coordinate with law enforcement


to investigate incidents. Security analysts understand and use ethical hacking techniques such as penetration testing and vulnerability assessment.


10.7.3 Interview: Security Analyst (Lesson Video) Transcript:

We live on a street that there is a lot of vandalism to the cars on the outside, and so, I got fed up with it and I put up IP cameras and we have not been egged for the past three years, so.

Being a security analyst is really fun. The reason I love doing it is because at any day or time, you can be doing a new challenge. A lot of time it's always different because you can see technology is expanding so quickly around us, and as a security professional you have to understand the technology, and then you have to understand the security needs behind that technology.

As a security analyst, it's my job to help my customer improve their security stature and also to investigate security incidents. There's a lot of different parts of security, right? And so, when I'm doing what we call red-teaming, it does feel kind of like a video game, because you use all these different tools to try to hack into a system and, uh, it honestly doesn't feel real sometimes when you get in. You know, you feel that excitement because you have access to the system, but understanding the background of everything that's happening to that point is really difficult.

How do people get into this field? As technology progresses, that's also changing all the time. Being able to get in in a security-level entry position, they're going to be looking that you have an IT background a lot of the time. You're going to do traditional education. Look into a program that is IT with a security emphasis. If you're looking for certs, the CompTIA certs are really good, so Network+, A+, Security+; those are good foundational certs that will help you.

A lot of adversity that people face in this field is that you're looking at these jobs that say you need five years of experience, but it's an entry-level position. So you need the experience in order to get the job, but the job requires that you have the experience before you get it. It's very frustrating at that point.

To overcome that, what you can do is you can work security in your house today. And you do that by writing a blog about security and doing projects in your own house. Raspberry PI is really cheap; anyone can pick one up for about thirty bucks.

We live on a street that there is a lot of vandalism to the cars on the outside, and so, I got fed up with it and I put up IP cameras. That required me to, uh, do the wiring in our house, and to set up the cameras, and set up the server that receives the video input and everything, and so it was a really long project, but, you know, the end part of it was I learned a lot. When you're in an interview with a hiring manager and explain those projects in depth that you've done, that will carry you a long way.

So if you are considering going into security, be active in the communities. Go to the conferences that happen. One of the biggest breakthroughs that I had in my career was I had the opportunity to—or I have the opportunity, I still do— volunteer at a conference called Black Hat. I get to meet security professionals from all over the world.

Get yourself in positions where you're working on a project as much as possible, and a different variety of projects at home. But be active on social media, especially LinkedIn. Create a blog. If you have a blog about your projects that you're working on—and it doesn't matter if someone else has done the same project and written a blog about it—it's

important that you write a blog. And so, taking those projects, trying to teach other people, will set you apart dramatically in this field. If you do that, opportunities will come out of nowhere.

The people that I've seen in my career that don't make it into security and they always wonder why they didn't is because they become stagnant and they don't want to push themselves. And it's hard. It's not easy, because no one wants to push their comfort zone. No one wants to do uncomfortable things, but if you do that, you'll push yourself

into a really cool position. I love what I do. And honestly, I can't see me doing anything else because it's so much fun.

10.7.4 Section Quiz (Section Quiz) q_itf_securitycareers_01

Which of the following BEST describes a system administrator? Answers:

• *He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.


• He or she works closely with law enforcement officials to investigate security breaches and other crimes.


• He or she is in charge of designing and implementing security methods to protect an organization's computer systems.


• He or she understands and uses ethical hacking techniques such as penetration testing and vulnerability assessment.


Explanation:

In smaller organizations, a system administrator is typically responsible for securing networks and responding to intrusions.

A computer forensics expert works closely with law enforcement officials to investigate security breaches and other crimes.

Information security analysts or engineers are in charge of designing and implementing security methods to protect an organization's computer systems. They must understand how to use ethical hacking techniques such as penetration testing and vulnerability assessment.

q_itf_securitycareers_02

A security analyst does which of the following? Answers:

• Is typically responsible for securing networks and responding to intrusions in smaller organizations.


• *Inspects the company's network for security breaches and recommends measures to prevent future attacks.


• Works closely with law enforcement officials to investigate security breaches, cyberattacks, and other crimes.


• Installs and configures access controls, monitors network performance, and detects unauthorized access.


Explanation:

A security analyst inspects the company's network for security breaches and recommends measures to prevent future attacks.

A computer forensics expert works closely with law enforcement officials to investigate security breaches, cyberattacks, and other crimes.

In smaller organizations, a system administrator is typically responsible for securing networks and responding to intrusions. He or she installs and configures access controls, monitors network performance, and detects unauthorized access.

q_itf_securitycareers_03

Which of the following is the system administrator's MOST important task? Answers:

• Installing firewalls and anti-malware protection


• Designing and implementing security methods

• *Monitoring and maintaining system security


• Investigating cyberattacks


Explanation:

A system administrator's most important tasks is to monitor and maintain system security. A computer forensics expert investigates security breaches and cyberattacks.

Information security analysts or engineers are in charge of designing and implementing security methods and installing firewalls and anti-malware protection.

q_itf_securitycareers_04

Which of the following would you do as a computer forensics expert? Answers:

• *Recover digital evidence, some of which may have been damaged or deleted from storage devices.


• Understand and use ethical hacking techniques such as penetration testing and vulnerability assessment.


• Research new threats and vulnerabilities and recommend measures to prevent future attacks.


• Install and configure access controls, backups, and firewalls as well as monitor network performance.


Explanation:

A computer forensics expert recovers digital evidence such as emails and file metadata, some of which may have been damaged or deleted from storage devices.

Security analysts research new threats and vulnerabilities. They inspect the company's network for security breaches and recommend measures to prevent future attacks. They understand how to use ethical hacking techniques such as penetration testing and vulnerability assessment.

A system administrator installs and configures access controls, backups, and firewalls. They also monitor network performance and detect unauthorized access.

q_itf_securitycareers_05

Forensics experts need to be thoroughly familiar with which of the following? Answers:

• *Data encryption methods, operating systems, and programming languages


• Ethical hacking techniques such as penetration testing and vulnerability assessment


• Firewalls, anti-malware, threats, vulnerabilities, security breaches, and attacks


• Access control, backups, firewalls, network performance, and unauthorized access


Explanation:

Forensics experts need to be thoroughly familiar with data encryption methods, operating systems, programming languages, and forensic software applications.

In addition to installing firewalls and anti-malware protection, they research new threats and vulnerabilities, inspect the company's network for security breaches, and recommend measures to prevent future attacks. A security analyst must understand how to use ethical hacking techniques such as penetration testing and vulnerability assessment.

A system administrator installs and configures access controls, backups, and firewalls. They also monitor network performance and detect unauthorized access.

11.0 IT Career Preparation

11.1 Chapter Introduction


A group of diverse individuals representing different careers in IT. Illustration.

IT Career Preparation

This chapter summarizes various career paths in Information Technology. It discusses future trends in IT and explores how college programs and certifications help students prepare for IT careers. The chapter concludes with helpful tips on finding and preparing for IT jobs.

After finishing this chapter, you should be able to:

• Describe the most common career paths in Information Technology.


• Identify and discuss future IT career trends.


• Identify college programs and certifications that are designed to help students prepare for IT careers.


• Discuss the importance of character development, job search networking, elevator pitches, professional resumes, and preparing for interview questions.


11.2 Education and Training Section Introduction

As you study this section, keep the following questions in mind:

• What parts of this course did I find most interesting?


• What decisions can I make now that will prepare me for my career?


• How can I learn more about jobs in IT?


After finishing this section, you should be able to:

• Describe various career paths in information technology.


• Identify and discuss future trends in information technology jobs, including hyper automation, predictive healthcare, edge computing, extended reality, the distributed cloud, blockchain technology, and the Internet of Things.


• Identify college programs that help students prepare for IT careers.


• Recognize the importance of certifications in IT fields such as networking, databases, cybersecurity, and project management.


Key terms for this section include the following:

Term Definition


Job Shadowing

Spending time observing a professional at work, learning what they do and getting a better feel for whether a particular career is something you'd like to pursue.


Internship

A short-term employment opportunity at an organization, typically accepted during the beginning of a person's career to gain job experience without pay.


Hyper-Automation

A business approach in which an organization identifies and automates as many tasks as possible in order to create higher efficiency and lower operational costs.

Predictive Healthcare

The process of analyzing historical medical data to predict what might happen to a person's health in the future. This allows doctors to recommend preventative measures for each patient.


Edge Computing

Moving processes closer to the computers or devices themselves and away from the centralized cloud, thus making them more efficient with greater speed, privacy, and bandwidth.


Distributed Cloud

A cloud network that's built on infrastructure dispersed throughout a large geographical area, allowing network devices to run closer to the source, or "on the edge."


Extended Reality

Sometimes known as XR, a broad term for technology that combines the real world with the virtual world. In addition to gaming applications, this technology is used for practical applications such as virtual tours of historic landmarks. XR is a superset of several other fields, including Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR).


Internet of Things

A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.


Blockchain

A record-keeping technology that was originally developed with the cryptocurrency Bitcoin. It contains two parts that store information about a transaction or event: the block of digital information (the "block") and a public database (the "chain").


Career or Technical Schools

Formerly known as a vocational or trade school, an educational institution with programs that are dedicated to help students prepare for specific careers such as automotive technology, culinary arts, and information technology. These programs usually take 1-2 years to complete.


Community or Junior Colleges

Colleges that offer two-year associate degrees which typically include courses in general studies with a few career- specific majors and classes. After graduation, many students go on to receive their bachelor's degree at a four-year college or university.


Four-Year Colleges and Universities

Larger institutions that offer a greater variety of majors and minors. Students typically graduate with a four or five year bachelor's degree, which can be either a liberal arts degree or a career-specific program like nursing, accounting, or computer science.


IT Certification

An assessment program that provides evidence of the technical skills and aptitude necessary to perform a job in information technology. Common IT certifications include entry-level, networking, databases, cybersecurity, and project management.


11.2.1 Choosing an IT Career Path (Lesson Video) Transcript:

Whether you're a teenager trying to decide what you want to be when you grow up, a college student choosing a major, or an adult looking to switch careers, the decision can be difficult. What do you want to do? If you're watching this

video, you may have already narrowed it down to a career in IT. In this video we'll talk about methods you can use in choosing a specific IT career path.

First, identifying a career. There are so many careers out there, even within the IT field. Narrowing it down to one or two can be done in different ways. One option is to take advantage of career centers at high schools, colleges, and even community centers. At these centers you can ask to speak with a career advisor about your interests and goals and they can help you decide what you might want to pursue. Another way to identify a career is through career assessment tests in which you'll be asked a variety of questions that assess your skills, values, personality and interests. Your answers to these questions will result in a report of potential careers that you might be interested in. Both paid and free assessments can be found online and at career centers.

You could also take a more proactive route in deciding a career path through job shadowing, working as an intern, and interviewing career professionals. Job shadows are an opportunity to spend a day observing a professional at work.

During this time, you can see exactly what they do and get a better feel for whether this is something you'd like to do as well. Internships are short-term employment opportunities at an organization given to people at the beginning of their career in order to gain experience. Although there are some paid internships, these are usually unpaid positions. An internship is a great way to get your feet wet in a certain career and help you decide if that's what you want to do. Lastly, interviewing career professionals are a great way to learn from an expert about career paths and ask for advice on how to enter their field. You can work with your local career center or career advisors to help you set up opportunities to job shadow, intern, or interview a working professional.

Once you've decided on a career path, it's a good idea to set a goal regarding your next step. First, pinpoint potential employers and careers that you could see yourself applying to and review their job requirements. Next, identify your strengths, education, and experience, and compare those to the posted job qualifications. What do you still lack? Do you need more education? Could that be a simple course? A certification? Or a degree? What about experience? Could you do another internship? Or maybe volunteer work? Once you've found the things you still need, it's important to write down your goals and plans for achieving them. It's also a good idea to get feedback on your plan from an advisor, mentor, or friend. Remember there's more than one way to get where you want to go professionally, so don't get discouraged if you need to adjust your plan.

In this video we discussed how to choose a career path in IT. While much of what we reviewed can be applied to a choosing a career in IT, these tips can be applied to choosing a career in any field.

11.2.2 Future Trends in IT

Many jobs today are utilizing technology that wasn't even imaginable 10 or 20 years ago. The coming years will bring even more opportunities to utilize new technologies in the workforce. The following are examples of cutting-edge fields and some of the jobs that they'll surely bring along with them.

Hyper-Automation


A robot and a drone working on a computer to provide different hyper-automated tasks. Illustration.

Hyper-automation is a business approach in which an organization identifies and automates as many of its tasks as possible. This is done to create higher efficiency and lower operational costs.

Though this technology will make some jobs obsolete, it will also shift focus to allow people to be the thinkers and decision makers instead of having to spend their time doing menial work. There will be positions for people who design these hyper-automation systems as well as for those who oversee and test them.

Predictive Healthcare


A doctor using a robot and other technology to treat and diagnose a patient. Illustration.

Increasingly, medical professionals are analyzing historical medical data as a way to predict what might happen with a person's health in the future. This allows doctors to recommend a variety of preventative measures that are personalized for each patient based on technological analysis.

This field will need many data analysts who can not only decide which data is relevant but can also collect that data and make good decisions based on it. Ideally, this would require a person with a background in both technology and medicine.

Edge Computing and the Distributed Cloud

Edge computing deals with moving processes closer to the computers or devices themselves and away from the centralized cloud. This is done to make them more efficient. Devices that must constantly send and request information from the cloud experience latency as the information constantly has to make round trips. Edge computing helps bring extra speed, privacy, and bandwidth to devices that use it. For example, a self-driving car contains many automated

systems that have to make split-second decisions. The sensors in the car don't have time to send data to the cloud and wait for it to come back. Nanoseconds count in these situations.

The distributed cloud is a cloud network that's built on infrastructure dispersed throughout a large geographical area. This allows the network's devices to run closer to the source, or "on the edge." This is different from a centralized cloud which has all of its infrastructure in a central location. The goal is to reduce latency and data loss.

Edge computing and the distributed cloud will require programmers and network administrators to help design and implement these systems in the near future. Any educational option that helps one develop the skills to build systems like these is almost certainly worthwhile.

Extended Reality


A man using extended reality technology to explore a spaceship that is projected in the background. Photo by Laurens Derks on Unsplash

Extended Reality (sometimes known as XR) is a broad term for technology that combines the real world with the virtual world. Though many gaming applications come to mind, there are also a variety of other practical applications as well (think of a virtual tour of a home or of a famous landmark in another country). In reality, XR is a superset of several other fields, which include Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR). AR uses technology to place virtual things on top of reality as it exists. VR gives users a 360-degree view of a virtual world through the use of a headset or other accessory. MR combines physical and digital worlds with digital overlays and actual physical objects.

There are going to be countless XR jobs available in the future due to the extensive possibilities that it brings. Teachers who are well versed in it will have an advantage in the future job market as will anyone trying to get into gaming, real estate, or tourism just to name a few.

The Internet of Things

The Internet of Things (IoT) refers to having a variety of smart devices that are connected to the internet. These things can be appliances, climate-control systems, entertainment devices, or even vehicles. These everyday devices can send and receive information over the internet, which allows for greater automation. For example, your climate-control system can be automated to detect when you're home and then automatically set the temperature to a specified level. It can turn itself off when you're not at home to save energy and money.

The Internet of Things has application in a variety of fields. It's going to be useful for architects as they design smart homes, vehicle engineers who make smart cars, and virtually anyone with an internet connection.

Blockchain Technology

Blockchain is a record-keeping technology that was originally developed to be used with the cryptocurrency Bitcoin. It contains two parts: the block of digital information (the "block") and a public database (the "chain"). Each block in the database chain stores information about a transaction or event and includes a variety of metadata about it. Each has a secure digital signature attached to it that keeps the identity of the person who generated it private. Also, each block contains a hash, which is a unique identifier that helps you tell it apart from other blocks. Once the block is added to the chain, anyone can see the metadata in it because it's then a public database. But, the identities of the parties involved are masked.

Many websites and companies are making cryptocurrency available as a valid way to pay for their goods and services. So, blockchain technology is becoming increasingly important.

11.2.3 College Programs


A recent college graduate in cap and gown looking out into the distance. Photo by Andre Hunter on Unsplash

Do you know what education or training it takes to land your dream job? This lesson describes common college program options to help you achieve the education and skills necessary for your career goals.

Career or Technical Schools

Career or technical schools have programs that are dedicated to help you prepare for specific careers. Some common programs include automotive technology, culinary arts, cosmetology, and information technology (IT). The greatest benefit to attending a career school is that you only take the classes you need for that career. The programs at these schools usually take one to two years to complete and graduates leave with either a certificate or an associate degree. Upon graduation, students will be able to quickly start a job at an entry-level position within their chosen field.

You should be aware that some of these schools are for-profit institutions which means they rely heavily on profits from tuition for funding and may be more expensive than other options. Many technical colleges, however, are non-profit

institutions which means they do not rely on tuition for funding. These non-profit colleges will often be the cheapest and quickest option to gaining the needed training and certifications to start a job in a chosen career field. A non-profit school will often offer financial aid options that allow students to graduate with little or no student debt. It's important to research any school before deciding which one to attend.

Community and Junior Colleges

Another option for schooling is at the community or junior college level. At these institutions, students receive an education for an associate degree which typically includes courses in general studies with a few career-specific majors and classes. Associate degrees typically take two years to complete.

Another option given at community colleges are career or vocational programs, similar to what you'd get at a vocational school. An advantage to this is that the schools themselves are state funded, so tuition will likely be considerably cheaper. Also, class sizes are smaller, which usually translates into better teacher-student interaction. A final benefit is that community colleges offer open enrollment so that anyone who applies to the school is accepted. Since credits from a community college associate degree can be transferred to a four-year university, many graduates go on to receive their bachelor's degree. An associate degree in applied science is typically designed to get you a career, while an associate in science is typically designed to transfer to a four-year college or university.

Four-Year Colleges and Universities

Universities are larger colleges that offer a greater variety of majors and minors. Graduates leave with a four or five-year bachelor's degree. At a college or university, you can pursue a liberal arts degree or a career- specific program like nursing, accounting, or computer science. Universities are more competitive institutions and the application process includes a review of educational performance including high school or community college GPA and college entrance exams like the SAT or ACT. A disadvantage that is that classes at these institutions can have higher student enrollment. This may make it more difficult to build relationships with professors. However, in competitive job markets, some students see the value in receiving a bachelor's or master's degree. These degrees can give candidates an edge in certain higher-paying IT careers, such as systems analysis, software engineering, and data science.

Universities can be funded by the state or by a private institution, which can impact the price of tuition. Since public universities are state funded, they are usually a cheaper investment. However, it's important to take into consideration that public universities have higher out-of-state tuition for those coming from a different state. Private universities are funded by private institutions (in many cases, a religious organization may support the school). Since private universities aren't funded by the state, tuition costs can be more expensive but they can include tuition discounts depending on other factors. In both private and public universities, you can apply for scholarships and grants that can aid in your search for funding.

Many high school students can also take advantage of dual credit or dual enrollment opportunities. They can end up with 16 or more college credits while still in high school.

11.2.4 IT Certifications

Information technology (IT) certifications are a great way to boost your resume for many reasons.

• Certifications provide evidence of your abilities. If you're certified, employers can be confident that you have the basic skills and aptitude necessary to perform the job.


• Since technology changes rapidly, having a current certification allows you to show that you're an up-to-date with the latest technology.


• Some companies make certification a requirement or preferred qualification for particular jobs.


• Being certified can help you advance in your career and help increase your salary. A job promotion and a little extra money are always welcome.


Whatever reason you use to get certified will only yield positive outcomes. This lesson outlines common IT certifications that could be beneficial to your career.

IT Certification Exam Providers


Industry certification exam provider logos for TestOut, CompTIA, and Cisco. Entry-Level Certifications

If you're looking to land an entry-level job in IT and have little to no experience, an entry-level certification is a good

way to gain the knowledge and skills you need. IT support positions fall into this category. Entry-level certifications include:

• TestOut PC Pro


• CompTIA A+


• Microsoft Technology Associate (MTA)


TestOut's IT Fundamentals Pro exam is considered a "pre-professional" certification that provides foundational knowledge for more advanced certifications. The CompTIA ITF+ exam was designed for a similar purpose.

Networking

A more advanced networking certification can help you gain skills in routing, switching, cloud computing, wireless networking, and more. Receiving these certifications can help you land a job as a network administrator, network engineer, or as an IT support specialist. Common networking certifications include:

• TestOut Network Pro


• TestOut Routing and Switching Pro


• CompTIA Network+


• Cisco Certified Network Associate (CCNA)


• Cisco Certified Network Professional (CCNP)


Databases

With a database certification you can find employment as a database administrator, database developer, or data analyst. You learn skills such as installing, configuring, and maintaining database management systems (DBMS), building applications that interact with a DBMS, and analyzing data. Common certifications include:

• IBM Certified Database Administrator


• Microsoft SQL Server certifications


• Oracle Certified Professional


• MySQL Database Administrator


Cybersecurity

Both personal and corporate data are increasing falling under attack to cybercriminals, creating a greater demand for jobs and certifications in security. Careers for people with a cybersecurity certification include penetration testing manager, information security manager, IT security consultant, and information security analyst. Cybersecurity jobs require skills in network attack strategies, penetration-testing tools, countering security vulnerabilities, and improving network security. Certifications that can help you attain these skills include:

• TestOut Security Pro


• TestOut Ethical Hacker Pro


• CompTIA Security+


• CompTIA Pentest+


• CompTIA CySA+

• Certified Ethical Hacker (CEH)


• GIAC Certified Incident Handler (GCIH)


• Certified Information Security Manager (CISM)


Project Management

A certification in project management prepares you for jobs as a project manager (PM). As a PM, you're a liaison between clients, developers, and other teams. You're required to have organizational, communication, negotiation, and leadership skills. Common project management certifications to prepare you for these jobs include:

• Project Management Professional (PMP)


• Certified ScrumMaster (CSM)


• Professional in Project Management (PPM)


• CompTIA Project+


11.2.5 Section Quiz (Section Quiz) q_itf2_futureittrends_01

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?

Answers:

• Internet of Things (IoT)


• Edge computing


• Blockchain technology


• *Hyper-automation


Explanation:

Hyper-automation is a business approach in which an organization identifies and automates as many tasks as possible through technology. This is done to create higher efficiency and lower operational costs.

The Internet of Things (IoT) refers to having a variety of smart devices that are connected to the internet. These things can be appliances, climate-control systems, entertainment devices, or even vehicles.

Edge computing deals with moving processes closer to the relevant computers or devices themselves and away from the centralized cloud in order to make them more efficient.

Blockchain is a record-keeping technology that was originally developed to be used with the cryptocurrency Bitcoin. q_itf2_futureittrends_02

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?

Answers:

• Internet of Things (IoT)


• *Blockchain technology


• Edge computing


• Extended Reality (XR)

Explanation:

With blockchain technology, a piece of data (the block) is added to a public database (the chain). Anyone can see the metadata in the database because it is public, but the identities of the parties involved are masked.

The Internet of Things (IoT) refers to having a variety of smart devices that are connected to the internet.

Edge computing deals with moving processes closer to the relevant computers or devices themselves and away from the centralized cloud in order to make them more efficient.

Extended Reality (XR) is a broad term for technology that combines the real world with the virtual world. q_itf2_futureittrends_03

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of?

Answers:

• *Internet of Things (IoT)


• Edge computing


• Blockchain technology


• Extended Reality (XR)


Explanation:

The Internet of Things (IoT) refers to having a variety of smart devices that are connected to the internet. These things can be appliances, climate-control systems, entertainment devices, or even vehicles.

Edge computing deals with moving processes closer to the relevant computers or devices themselves and away from the centralized cloud in order to make them more efficient.

Blockchain is a record-keeping technology that was originally developed to be used with the cryptocurrency Bitcoin. Extended Reality (XR) is a broad term for technology that combines the real world with the virtual world. q_itf2_futureittrends_04

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

Answers:

• Edge computing


• Blockchain technology


• *Predictive healthcare


• Hyper-automation


Explanation:

Predictive healthcare will need many data analysts who can not only decide which data is relevant, but who can also collect that data and make good decisions based on it.

Edge computing deals with moving processes closer to the relevant computers or devices themselves and away from the centralized cloud in order to make them more efficient.

Blockchain is a record-keeping technology that was originally developed to be used with the cryptocurrency Bitcoin. Hyper-automation is a business approach in which an organization identifies and automates as many tasks as possible. q_itf2_collegeprograms_01

Which of the following schools allows students to receive dedicated training for a specific career? Answers:

• *Technical college


• Community college

• High school


• Junior college


Explanation:

Technical colleges have programs that are dedicated to help you prepare for specific careers. Some common programs include Automotive Technology, culinary arts, cosmetology, and Information Technology (IT).

Community and junior colleges allow students to receive an education for a two-year associate degree. This typically includes courses in general studies along with a few career-specific classes.

High school needs to be completed before being able to attend any higher education. q_itf2_collegeprograms_02

Which type of college would you attend to earn a bachelor's degree? Answers:

• Technical college


• Community college


• High school


• *University


Explanation:

Universities are larger colleges that offer a greater variety of majors and minors. Graduates leave with a four or five-year bachelor's degree. At a university, you can pursue a liberal arts degree or a more career-specific program like nursing, accounting, or Computer Science (CS), among many others.

Technical colleges have programs that are dedicated to help you prepare for specific careers. Some common programs include Automotive Technology, culinary arts, cosmetology, and Information Technology (IT).

Community colleges allow students to receive an education for a two-year associate degree. This typically includes courses in general studies along with a few career-specific classes.

High school needs to be completed before being able to attend any higher education. q_itf2_itcerts_01

Which of the following certifications would you pursue to help you land a job as a network administrator? Answers:

• CompTIA A+


• *Cisco CCNA


• PMP


• CEH


Explanation:

The Cisco CCNA is an industry certification that can help you learn skills in routing, switching, cloud computing, wireless networking, and much more. This certification can help you land a job as a network administrator, network engineer, or as an IT support specialist.

The CompTIA A+ is an entry-level certification that can help you acquire the skills needed to perform well in an entry- level technology position such as IT support technician or help desk technician.

The PMP, or Project Management Professional, prepares you for jobs as a project manager (PM). The EC-Council Certified Ethical Hacker (CEH) prepares you for a job in the cybersecurity field. q_itf2_itcerts_02

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she

pursue?

Answers:

• CompTIA A+


• Cisco CCNA


• PMP


• *CEH


Explanation:

The EC-Council Certified Ethical Hacker (CEH) prepares you for a job in the cybersecurity field. Some target careers for those with a cybersecurity certification are penetration manager, information security manager, IT security consultant, and information security analyst.

The CompTIA A+ is an entry-level certification that can help you acquire the skills needed to perform well in an entry- level technology position such as IT support technician or help desk technician.

The Cisco CCNA is an industry certification that can help you learn skills in routing, switching, cloud computing, wireless networking, and much more.

The PMP, or Project Management Professional, prepares you for jobs as a project manager (PM).

11.3 Finding a Job Section Introduction

As you study this section, keep the following questions in mind:

• What are the most important things I want potential employers to know about me?


• How do my experiences uniquely qualify me for work?


• How can I improve my own social skills?


After finishing this section, you should be able to:

• Discuss character traits needed for success in IT careers, including integrity, resourcefulness, and social skills.


• Recognize the importance of job search networking.


• Prepare a resume that effectively highlights your skills and experience.


• Craft a short, persuasive "elevator pitch" that describes who you are and the type of job you're seeking.


• Prepare for and respond effectively to a wide range of job interview questions.


Key terms for this section include the following:

Term Definition


Character

Habits and life skills that make people who they are.


Integrity

A characteristic that demonstrates high moral character whether or not a person is being watched.

Resourcefulness

The ability to do everything in one's own power to find ways to solve problems using whatever resources are available.


Social Skills

The ability to have good interpersonal skills, ask good questions, listen well, cultivate trust, and work well in groups.


Social Networking

The act of making real and authentic connections with people. To gain employment, job candidates typically use their social network to find available opportunities.


Resume

A brief written summary of the education, work experience, skills, and qualifications of a potential employee.


Elevator Pitch

A way for people to quickly and effectively introduce themselves to important contacts (e.g. potential employers) in order to make a good first impression. An elevator pitch is usually made up of your name, what you do, what your passion is, and your career goals.


Traditional Interview

A typical one-on-one in-person meeting with a hiring manager or potential supervisor.


Phone Interview

A traditional interview that is done over the phone or through a video conference call rather than in person.


Panel Interview

An interview by a panel of hiring managers.


Case Interview

An interview that lets an employer test a job candidate's skills and evaluate their ability to handle challenges and solve specific problems effectively.


Group Interview

A meeting with a hiring manager or panel of interviewers and a group of other potential employees.


Working Interview

A job audition in which employers ask candidates to work for a day or more to see how well they can handle the actual tasks of a job.


C.A.R. Statement

"Challenge Action Result" statements that prepare job candidates to illustrate times when they faced a challenge, took a specific action, and experienced a successful result.


Business Professional Attire

Business attire that typically includes a nicely pressed business suit with a light-colored button up shirt, a tie, and well- polished shoes.


Business Casual Attire

Business attire that consists of a nice dress shirt, slacks or a skirt, and polished shoes.


Smart Casual Attire

Less formal business attire that includes more options such as chinos or khakis, a nice finger-length skirt, with a collared or polo shirt.

11.3.1 Character and Professionalism (Lesson Video) Transcript:

As you make your way into a professional career, it's obviously important that you act responsibly and professionally. In this video, we'll talk about some habits and life skills that will help you cultivate high moral character and professionalism.

George is a PC repair technician. A customer brings a computer to him to fix screen resolution issues on the monitor. George notices that the fix simply requires an update to the graphics driver. Although completely unnecessary, he could tell the customer that the issue requires a higher quality graphics card, which would cost significantly more than what was actually needed. What would you do in this situation if you were George? Your response says a lot about your integrity. Integrity means that you possess high moral character whether or not you're being watched by others. As a professional, your integrity creates a positive work environment. You inspire trust and respect among your coworkers, supervisors, and clientele.

You can start practicing integrity by consistently following through on your commitments and holding yourself accountable for completing projects and following company policies – even when no one else is watching. People with integrity excel in their careers because they earn the trust and respect of their peers and superiors.

Susy works as a technical support specialist. She receives a call from an employee who is telecommuting from her home office. She has lost her internet connection and needs help resolving the issue. Susy asks the employee to try a different website and then to restart her browser. Still no connection. She then suggests using her tablet to connect to the internet. Wi-Fi doesn't appear to be working there either. They try troubleshooting the network adapter using the Windows Network Diagnostics tool. This doesn't fix the issue. So Susy ask the employee to check the LED status indicators on her wireless router. They decide to disconnect the power cord on the router and then reconnect after a few seconds. After waiting patiently for a few minutes, the employee's internet connection is restored. If this hadn't resolved the problem, Suzy knows she could check her knowledge base software for other ideas. In this scenario, Susy showed her resourcefulness in following all the way through in helping her client.

Being resourceful means doing everything in your own power to find ways to solve problems. You can develop greater resourcefulness by thinking creatively about daily tasks, having confidence in yourself and trusting your instincts, being proactive in working through difficult assignments, and being persistent and never giving up. Although resourcefulness at times sounds like being independent, people who are resourceful are also humble and willing to ask for help when needed.

Peter is a computer software engineer who usually works solo from home developing software for his company. However, because of his good interpersonal skills, including his ability to communicate, work well on teams, and provide great customer service, his company has given him the opportunity to be promoted to a higher position. While a job in software engineering can at times be an extremely solitary job, Peter's social skills have set him apart from his colleagues and given him a well-deserved promotion.

You can improve your social skills by showing interest in others and working on your listening skills. Learn to ask good questions, listen, and when applicable, offer appropriate feedback. By showing your interest in conversations, people will learn to trust you and your opinions. Also, learn to speak clearly and assertively. This can be difficult for natural introverts, but you can start by practicing speaking in front of a mirror. It sounds a bit odd, but this type of practice can help you feel more comfortable speaking up in real life. In addition, learn to read body language. A person with good social skills can tell what someone is communicating through their posture, facial expressions, or tone of voice. Lastly, start socializing in new settings. Introduce yourself to new people, talk about your personal and career goals, and again, ask good questions and take time to listen.

In this video, we discussed some important traits needed for success in IT careers. Specifically, we talked about having integrity, being resourceful, and improving your social skills. You can start improving your character and professionalism now by practicing these skills in your daily life.

11.3.2 Networking (Lesson Video) Transcript:

The best way to get a job is through someone you know, or through someone who knows someone you know, or through someone who knows someone you know who knows someone you know. Did you follow that? What I'm trying to say is that finding a job is much easier when you use your network of connections. While it isn't impossible to land a job based purely on your own reputation, you'll typically have better chances of getting a job when reaching

out to your network. In this video, we'll talk about how to network with people and how to use your network to obtain a job interview.

I know the word networking might sound intimidating but in its simplest form networking is essentially making real and authentic connections with people. Although you can network practically anywhere and anytime, a lot of networking happens at events specifically designed for networking. These can be hosted by colleges, professional groups, or companies. Anyone who wants to bring like-minded people together can plan a networking event.

Before you arrive, you should think about preparing what you might say to people when you introduce yourself. This is commonly called a personal elevator pitch. Why elevator pitch you say? Well, imagine walking into an elevator and seeing the CEO of a company you've been wanting to work for. This is your chance to share a little bit about yourself before one of you has to get off. You want to make sure you say the right things within that short period of time. A personal elevator pitch is basically a way for you to quickly and effectively introduce yourself to people, a way for you to make a good first impression. A good elevator pitch usually is no longer than 30 seconds and includes stating your name, what you do, what your passion is, and your career goals.

Here's a simple example, "Hi, my name is Riley, and I'm a student at RMKU, soon to be graduating in information technology. I really enjoy meeting people and helping them fix their computer issues. I'm hoping to find work as an IT help desk specialist." Be sure to practice your elevator pitch sufficiently so you feel and sound confident when introducing yourself to people you meet.

Once you're at the event, you don't want to go up to people and recite your elevator pitch robotically to everyone. Remember your goal is to make connections. So, let's talk about some tips you can use to break the ice and interact with people. First, if you know there will be some type of food and drink, don't come hungry. The refreshments aren't there to satisfy your hunger but a way for people to mingle over a light snack. Your goal is not to eat, it's to network. And it'll be harder to talk to you if your mouth is full of those cheese and crackers you're going to town on. Of course, the exception to this is if you're going to a meal event such as a networking lunch. Then of course, come ready to eat your lunch.

However, standing in line at the food table at any event is a great place to talk to people. Since everyone eats, this provides a great segue into meeting people. While waiting in line, you could say something like, "That artichoke dip looks amazing. Have you tried it yet?" Which can easily lead into, "What brings you to this event?" or "Have you been to an event hosted by this organization before?"

Another tip is to look for people who are alone. Although you might be tempted to get directly into a conversation with potential employers, presenters, or hosts, there might be long lines of people waiting to talk to them. People who are alone are likely more than willing to talk to you. After all, it's a networking event. A simple, "May I join you?" should do the trick. If the conversation isn't as productive as you had hoped, you always have the excuse to go back to the food table.

A great tip for breaking the ice actually occurs before you even go to the event. If you have access to the list of people attending, try to identify someone you'd like to connect with and send them a quick message via email or LinkedIn.

Mention something like, "Hi I'm Riley Jarvis. I'm really excited about this networking event and noticed you're also planning on attending. I just wanted to introduce myself and hope to see you there." Now, this is helpful because your ice breaker at the event could be, "Hi I'm Riley, I sent you a message on LinkedIn a couple of days ago. Nice to finally meet you."

Lastly, you could always ask people about the actual event or location. Things like, "What did you think about the speakers?", "What was your favorite part about the presentation?", or "This a beautiful venue. Have you been here before?" After these or other conversation starters, you'll more than likely be asked about who you are. This is where that elevator pitch comes in handy. So, practice, practice, practice. When you feel like you've made a meaningful connection, be sure to have business cards with your name and contact information ready to give out. You could also follow up with your connections through professional social networking sites like LinkedIn.

Networking never ends and you should always work on expanding your network by building more connections with people. However, as soon as you've started networking, you can use your contacts to find a job. Be sure to reestablish your relationship with those you've connected with before you ask for help. For instance, if you have continual communication with a certain contact, such as a friend or family member, you might feel comfortable

enough to just ask for a job referral. However, if your contact is an acquaintance you've only talked to once or twice, you might want to refresh their memory as to how they know you before asking for help. You might also reintroduce yourself at another networking event or on social media, or by inviting them to lunch or coffee. Once you've reaffirmed the connection, you can feel more comfortable asking for help through a job referral or an introduction to someone they know at a company you'd like to work for.

A good tool to apply in making use of your network is requesting informational interviews, where you meet with a

professional in a career you're hoping to get into. This is not necessarily the place to ask for a job but a way to learn more about a particular career or industry. You can also ask for advice about your education and intended career path. Again, building relationships is key here, so act professionally and be ready to send follow-up thank you notes or emails after your meeting.

In this video we discussed the invaluable skill of being able to network well. We talked about how to network at various events and how to use your network to get a job. Although networking can seem scary, remember you can do it at any event. Get into the habit of talking to people around you and sharing your life and career goals. You never know if the person you meet knows a person, who knows a person, who knows a person who can help you reach your goals.

11.3.3 Resumes

A resume is a brief written summary of your education, work experience, skills, and qualifications. When you apply for jobs or internships, companies request a resume as the initial step in assessing your ability to handle the duties of the job. This lesson contains some tips you can use when you write your own resume.

Formatting

Consider the following formatting options when creating a resume:

• Use 11 pt. or 12 pt. font for the body of the resume.


• Use 1-inch margins on all sides. In cases where you need more space, you can adjust the margins to .5 inches on all sides.


• Use a line of blank space between sections to allow for easier readability.


• Consider the use of italics, bold, and underlining to emphasize key points.


• Keep the resume down to one page in length and summarize the experience most relevant to the job you're applying for. In cases where you have a lot work experience, you can include up to two pages, but never more than this.


Contact Information

At the top of a resume, candidates include their name and contact information. Most of the time, an email address and phone number should be enough, but you may consider including a URL to your LinkedIn page or personal website. Another common feature in this section is your current location (city, state, and zip code). This helps recruiting managers know if relocation will be something to consider in your hiring.

Education and Training

When describing your education, make sure to include the institution you attended, the degree received, and the month and year you graduated. If you haven't graduated yet, you can still include the month and year of your expected graduation date. It's also common to mention your GPA only if it was higher than a 3.0.

Experience

Under the experience section, outline your previous work experience. This can include paid employment, paid or unpaid internships, and relevant volunteer experience. The most common way to write this is in reverse chronological order, which means that you include your most recent work experience at the top and work your way down to previous employment. Remember to include the company you worked for, your position at the company, and the months and years you were employed. Use short statements or bullet points to describe what you did at each job. It's also a good idea to include C.A.R. (Challenge, Action, Result) statements on your resume to show proof of your ability to handle difficult tasks.

Certifications, Skills, and Coursework

Many recent graduates or career changers might not have the necessary work experience to show their ability to take on a job. For this reason, some people choose to include industry certifications they've received, skills they've acquired, and any coursework that may be applicable. While you might not have the preferred years of experience, mentioning certifications, skills, and coursework communicate to potential employers your ability to learn new things and work toward achieving goals.

11.3.4 Interviewing Tips: Part I (Lesson Video) Transcript:

Congratulations! You got an interview. Now what? Well, the best way to land that job is to ace your interview. In this video, we'll offer some tips on preparing and practicing for job interviews.

First, you have to prepare. You can't just plan on winning over your audience with your good looks and charming personality. In order to be ready for what might come in the interview, you have to know your target audience. Be sure to study as much about the company as possible before you go. You could do this by visiting the company's website to learn more about their mission and what they offer to customers. If at all possible, be sure to sample their products or services or talk to someone who has. It's also a good idea to learn about the company's culture by talking to any contacts you may have at the company or visiting the company's LinkedIn page.

Next, make sure you know what type of interview you'll be having. Most of the time job candidates will go through a couple of interviews during the interview process. This could be done all in the same day or across a couple of days as you're considered for the next stage in the process. The types of interviews you might have include traditional, phone or video conference, panel, case, group, and working interviews. A traditional interview is the typical one-on-one, in- person meeting with a hiring manager or potential supervisor where you'll be asked about your skills, education, and work experience. A phone or video conference interview is similar to a traditional interview except that it's done over the phone or through a video conference call. Recently, it's become common for these types of interviews to be done as video recordings of your answers instead of an actual conversation with a person. A panel interview is also similar to a traditional interview, but you're interviewed by a panel of hiring managers. This is often done to save time in the process but also to give the hiring manager another opinion of the candidates. A case interview gives the company an opportunity to test your skills and evaluate your ability to handle challenges effectively. In these types of interviews, you'll be given an issue or problem to solve. This usually occurs at later stages in the interview process. A group interview is a meeting with a hiring manager or a panel of interviewers and a group of potential employees. It's especially important to come prepared for a group interview because you don't want to sound uncertain or underqualified in your answers and appear less capable of doing the job compared to other candidates. Lastly, although rare, are working interviews. These are sort of like an audition in which employers ask you to come in to work for a day to see how well you can handle the tasks of the job.

Once you know more about the company and the type of interview you'll likely be having, it's time to start practicing for the interview. It's important to know how to respond to some of the most difficult questions that might come up. While we'll discuss some of these in this video, I suggest you look up other questions online to best prepare yourself.

One of the most asked questions in job interviews is the very first one, the ‘Tell me a little bit about yourself' question. This is not the time to talk about where you're from, what you like to do in your free time, or any other trivial thing about yourself. Remember, you only get one chance for a first impression and this is it. Use this opportunity to give a version of your 30 second elevator pitch and talk about how your skills and personality are a great fit for the position you're applying for. Here's an example: "I'm a recent computer science graduate with over two years of Java programming experience working in financial services. I love software engineering because it lets me make complex, difficult business operations easier to implement. I'm a proactive person and I hope to see how my skills can help your company develop better software solutions."

Another common question is, ‘What is your greatest strength?' This is your chance to tell the interviewers why you're qualified for the job. Your greatest strength should be directly tied to your ability to execute your job well and efficiently. Make sure to not only state your strength but also give examples of how your strength has helped you in previous experiences. For example, you could say something like, "My greatest strength is my ability to learn quickly. My previous company used a lot of new technology that I wasn't familiar with. Because of my ability to adapt and understand things quickly it was only a couple of weeks before I felt proficient in the new technologies."

The next question falls on the opposite spectrum: ‘What is your greatest weakness?' This is a hard question because we naturally don't want to show too much vulnerability. But many employers like to see humility in potential employees. Unfortunately, they likely won't buy into the "I'm a perfectionist" or "I'm a workaholic" weaknesses. So be honest and pick a genuine weakness that you've recently worked on overcoming. By giving examples of your ability to cope with a personal weakness, you can put a more positive spin on it. A good example is, "My greatest weakness is that I often have very little patience. However, I've recently made some good progress. In my last position, I was assigned to train new employees. This gave me a chance to practice more patience and develop greater empathy toward people who might be struggling to meet expectations."

At some point in an interview you'll likely be asked to describe a time when you were faced with an obstacle and what did you do to overcome it. One of the best ways to prepare for difficult questions like this one is to prepare C.A.R or

P.A.R statements which stand for challenge or problem, action, and result. In other words, these statements prepare you to talk about a time when you had a problem, the action you took to fix it, and the results that came from it. It's important that you prepare many of these statements to keep on your mental list in order to give you several opportunities to share about the successes you've had in your previous work experience. Here's a simple example of one: "At the last company

I worked for, the IT department didn't have an effective ticket system to track and prioritize all of the help desk issues. I suggested that we rank the issues by priority when the tickets were reported so issues with higher priority could get fixed first. This resulted in tickets being processed and fixed 30% faster."

The topic of compensation will also come up in most interviews. It's always tough to talk about money but it's absolutely necessary. This is a challenging question because you don't want to sound too self-confident and overvalue yourself. On the other hand, you don't want to undervalue yourself and potentially get an offer that doesn't match your skills and experience. It's crucial that you do your research before the interview and come ready to answer this question. In your research, look for salary ranges in your area, for someone with your education and years of experience.

Lastly, in an interview you might simply be asked why you want this job. This is where your preparation comes into play. As we mentioned before, you should learn as much as you can about the company, their products and services, and the company culture before your interview. In responding to this question, you can confidently explain why your experience, interests, and education align well with the company's goals, mission, and culture.

One final tip: in addition to anticipating your interviewer's questions, come prepared with a few questions of your own. Most employers will expect you to have enough curiosity to ask about specific benefits, company goals and accomplishments, and particular challenges they might be facing.

If you're concerned about sounding too rehearsed in your interview, it's always better to sound rehearsed over sounding underprepared. Remember, practice makes better.

In this video, we discussed several suggestions that you can use to prepare for an interview. As you implement these ideas into your preparation and job hunt, you'll be more likely to find success in landing that dream job you've been looking for.

11.3.5 Interviewing Tips: Part II (Lesson Video) Transcript:

Now that you've prepared and practiced for your interview, what's next? In this video, we'll discuss what to wear on the day of your interview, how to conduct yourself during the actual interview, and what to do in terms of following up afterwards.

Let's discuss proper interview attire for different types of interviews. Usually you can either go business professional, business casual, or smart casual. Business professional is the typical nicely pressed business suit with a light-colored button up shirt, a tie, and well-polished shoes. Business casual is the next step down where a nice dress shirt, slacks or a skirt, and polished shoes. A tie is optional in this case. Smart casual is the next step down. You can feel free to wear chinos or khakis, a nice finger length skirt, with a collared or polo shirt. Here you can experiment a

little more with more colors and patterns in your attire. A general rule that's safe to go by when deciding what to wear to an interview is to dress a step above what the position would require you to dress. For example, if you were applying to be a lifeguard you probably wouldn't need to dress up in a suit and tie. You would just wear some nice casual clothing. If you're unsure about what to wear, just ask. Don't be afraid to reach out to a contact you may have at the company or the recruiter working with you in the interview process. Whatever you decide to wear, just remember that it's better to be a little overdressed than under. So just make sure you're well-groomed and appropriate for the occasion.

We've already talked extensively about preparing for different types of interviews and for specific questions you might be asked. As long as you've prepared and practiced beforehand, you have every reason to be confident and optimistic during the actual interview. Maintain eye contact with your interviewer and remember that they're trying to impress you as much as you're trying to impress them. Try to relax and be as pleasant and congenial as you can in spite of the anxiety you might be feeling. Remember to come prepared with specific questions regarding company benefits, goals, successes, and challenges. And if you're caught completely off-guard by a question, don't be afraid to admit that's a question you hadn't put much thought into. Then respond the best you can. At the conclusion of the interview, tell your interviewer how much you appreciate their time and let them know you look forward to hearing from them.

Now let's talk for a minute about what to do after the interview. Even if it went flawlessly and you're absolutely sure the job is yours, remember to pursue the opportunity and don't wait to make post-interview contact. It is a good idea to follow up afterwards with the people who interviewed you. This could be a quick email or a simple thank you note. You don't have to write a lot but remember to thank the person again for their time, include a few specific details about the interview that make you stand out, and close by mentioning your enthusiasm about potentially working at the company. Writing a thank you note or email will ensure that the hiring managers don't forget you among the other candidates.

In this video we reviewed proper interview attire, interview conduct, and post-interview communication. We hope these tips will help you at whatever point you are in your job search.

11.3.6 Section Quiz (Section Quiz) q_itf2_resumes_01

How many pages should a resume be for someone looking for their first job? Answers:

• *1


• 2


• 3


• 4


Explanation:

A resume should ideally be one page in length and summarize the experience most relevant to the job you are applying to. In cases where you have a lot of work experience, you can include up to two pages but nothing more. q_itf2_resumes_02

Which of the following is the most common type of resume? Answers:

• Functional


• Combination


• Targeted


• *Chronological


Explanation:

A chronological resume is the most common type used. This resume type lists work history starting with your most recent employment on down. This resume is often preferred because it provides a quick snapshot of work history. A functional resume focuses on skills and experience instead of dates.

A combination resume details both skills and experience and includes a chronological work history as well. Targeted resumes are customized to the job being sought after.

A.0 TestOut IT Fundamentals Pro - Practice Exams

A.1 Prepare for TestOut IT Fundamentals Pro Certification

It's important to prepare for an exam by studying the course material, practicing skills, and committing new concepts to memory. You can use the instruction and tests in this course to help you prepare more efficiently.

We recommend that you take the following steps as you prepare for the TestOut IT Fundamentals Pro Certification exam:

Step Description


Study the course material

The course materials include text lessons, demonstrations, video lessons, and hands-on labs. As you work through the course, follow these hints for the effective study:

• Review the learning and exam objectives on each section page. The objectives outline the knowledge and skills you'll need for the official certification exam.


• Watch the videos.


• Watch the demonstrations.


• Read all text lesson fact pages.

• Practice the tasks in the lab simulations until you feel comfortable with your ability to complete them.


• Avoid skipping any sections unless you can easily pass the Practice Questions at the end of each section. Even if you already know the material, a review can always be helpful when preparing for an exam.


Review the certification exam domains and objectives

Review the domains and objectives for the TestOut IT Fundamentals Pro Certification provided in this section.


Take the domain practice exams

The domain practice exams group the performance-based labs by domain and helps assess your understanding of a particular TestOut IT Fundamentals Pro Certification domain and the corresponding objectives.


Take the Certification Practice Exam

After you are confident with your ability to complete the labs, take the certification practice exam to assess your preparedness to take the certification exam.

• This exam has roughly the same number of questions and time limit as the TestOut IT Fundamentals Pro Certification.


• Practice questions are designed to assess your knowledge as it relates to the exam objectives.


• Based on your practice exam results, review the course material for questions that you missed.


• Focus your time on understanding the topics covered in the objectives and not on memorizing answers as the actual certification exam will have a different set of questions.


• When your practice exam scores are consistently over 95% and you feel confident in your understanding of the exam objectives and topics, the next step is to take the certification exam.


Schedule and take the certification exam

The TestOut IT Fundamentals Pro Certification is scheduled through LabSim. If you are taking this course through an instructor, contact your instructor to schedule your exam.


A.1.1 Pro Exam Objectives

The TestOut IT Fundamentals Pro course and certification exam cover the following TestOut IT Fundamentals Pro objectives:

#

Domain Module.Section


1.0

Hardware

Internal Components

• Explore motherboard components.


• Install and upgrade components.


• Troubleshoot components.


• Clear CMOS settings.


3.3, 3.6

4.3


1.2

Input & Output

• Connect proper cables to a computer system.


• Connect peripherals to a computer system.


3.4


1.3

Storage

• Install storage media into a computer.


• Create volumes and format drives.


• Perform Disk Maintenance.


• Troubleshoot System Power.


3.5, 3.6

10.6


2.0

Software


2.1

Applications

• Pin and unpin applications to the Start Menu and taskbar.


• Use Microsoft Word to open, modify and save a document


• Use Microsoft PowerPoint to open, modify and run a slide show.


• Use Microsoft Excel Tables and Charts to analyze data.


• Troubleshoot applications.


2.2

Printing

• Open and print a document from Microsoft Word.


• Configure local and network printing.


4.6

6.3


2.3

Application Delivery

• Configure a Windows system for automatic updates.


• Use Windows Task Manager to manage application startup.


4.7

6.6


3.0

Operating Systems


3.1

System Software

• Change display settings in Windows.


• Use Windows Device Manager to update drivers.


• Update and manage BIOS/UEFI settings.


• Explore operating systems.


4.2, 4.3


3.2

File Management

• Manage files and folders in the Windows file system.


• Manage file and NTFS permissions.


• Use command line utilities.


• Create a virtual machine.


4.3, 4.4

Networking


4.1

Internet Technologies

• Use Microsoft Outlook to respond to email.


• Configure browser privacy and security features.


• Copy files from the local Windows file system to OneDrive.


• Configure and manage smart devices.


• Enable and use a Proxy Server.


• Clear browser cache.


5.3, 5.4, 5.6, 5.7


4.2

Network Configuration

• Use a cable modem to connect to the Internet.


• Connect to, configure and use a secure wireless network.


• Install, configure and manage a network connection.


• Troubleshoot network connections.


• Manage mobile and bluetooth devices.


• Configure and manage a VPN connection.


6.2, 6.3, 6.4, 6.5, 6.7


5.0

Databases


5.1

Database Access 7.2, 7.3

9.3


• Use Microsoft Access to explore database objects.


• Use Microsoft Access Reports to Analyze Data.


• Create database tables using Microsoft Access.

• Create table relationships using Microsoft Access.


5.2

Database Queries

• Use Microsoft Access to perform basic queries.


• Write SQL commands to retrieve all data from a table.


• Write SQL commands to retrieve data matching criteria.


• Write SQL commands to add and delete records.


7.4


6.0

Programming


6.1

Programming Fundamentals

• Use JavaScript to create an If... Else statement.


• Use JavaScript to define and call a function.


• Use JavaScript to create for loop and a while loop.


8.3


6.2

Web Development

• Use HTML tags for head, body, ordered list, and unordered list.


• Use HTML to add headings, images and hyperlinks to a web page.


• Use HTML to Link a CSS file to an HTML page.


• Create CSS Style sheets to add a drop shadow to an element.


• Create CSS style sheets to resize an image and change a font.


• Use JavaScript to add functionality to a button on a web page.


8.5


7.0

IT Systems and Security


7.1

Device Security

• Configure Windows Defender to protect your home computer.


• Configure Windows Firewall for different networks.


• Secure a home wireless network.


• Configure remote wipe on a device.


• Install and configure a UPS.


10.4, 10.5, 10.6


7.2

Device Security

• Configure Windows backup settings.


• Configure access control and authentication.


• Configure File Encryption.


• Configure and restore data using File History.


• Evaluate possible social engineering exploits.


10.2, 10.3, 10.4, 10.5, 10.6


A.1.2 Pro Objectives by Course Section

The TestOut IT Fundamentals Pro course covers the following TestOut IT Fundamentals Pro exam objectives: Section

Title Objectives


1.0

Course Overview


1.1

Chapter Introduction


1.2

What Is Information Technology?


1.3

Technology and Ethics

2.0

Information Technology Basics


2.1

Chapter Introduction


2.2

Introduction to Computers


2.3

Digital Data


2.4

Media Formatting


2.5

Digital Media Careers


3.0

Computer Hardware


3.1

Chapter Introduction


3.2

Computing Devices


3.3

Internal Components

1.1 Internal Components

• Explore motherboard components.

• Install and upgrade components.


3.4

Input and Output

1.2 Input & Output

• Connect proper cables to a computer system.

• Connect peripherals to a computer system.


3.5

Storage

1.3 Storage

• Install storage media into a computer.

• Create volumes and format drives.

• Perform Disk Maintenance.

3.6

Hardware Troubleshooting

1.1 Internal Components

• Troubleshoot components.

1.3 Storage

• Troubleshoot System Power.


3.7

Computer Hardware Careers


4.0

Computer Software


4.1

Chapter Introduction


4.2

Operating Systems

3.1 System Software

• Change display settings in Windows.


4.3

More System Software

1.1 Internal Components

• Clear CMOS settings.

3.1 System Software

• Use Windows Device Manager to update drivers.

• Update and manage BIOS/UEFI settings.

3.2 File Management

• Create a virtual machine.


4.4

File Management

3.2 File Management

• Manage files and folders in the Windows file system.

• Manage file and NTFS permissions.

• Use command line utilities.


4.5

Application Software

2.1 Applications

• Pin and unpin applications to the Start Menu and taskbar.

• Use Microsoft Word to open, modify and save a document

• Use Microsoft PowerPoint to open, modify and run a slide show.


4.6

Printing

2.2 Printing

• Open and print a document from Microsoft Word.

• Configure local and network printing.


4.7

Software Troubleshooting

2.3 Application Delivery


• Use Windows Task Manager to manage application startup.


4.8

System Support Careers


5.0

Internet Technologies


5.1

Chapter Introduction


5.2

The World Wide Web


5.3

Web Browsers

4.1 Internet Technologies

• Configure browser privacy and security features.

• Enable and use a Proxy Server.

• Clear browser cache.


5.4

Cloud Computing

4.1 Internet Technologies

• Copy files from the local Windows file system to OneDrive.


5.5

Social Media


5.6

Internet Communications Technologies

4.1 Internet Technologies

• Use Microsoft Outlook to respond to email.


5.7

The Internet of Things

4.1 Internet Technologies

• Configure and manage smart devices.


5.8

Online Research


5.9

Internet Technology Careers


6.0

Networking


6.1

Chapter Introduction


6.2

Networking Basics

4.2 Network Configuration

• Install, configure and manage a network connection.


6.3

Wired and Wireless Networking

2.2 Printing

• Configure local and network printing.

4.2 Network Configuration

• Connect to, configure and use a secure wireless network.

• Install, configure and manage a network connection.

• Manage mobile and bluetooth devices.


6.4

Internet Connectivity

4.2 Network Configuration

• Use a cable modem to connect to the Internet.

• Connect to, configure and use a secure wireless network.

• Manage mobile and bluetooth devices.

• Configure and manage a VPN connection.


6.5

Networking Protocols

4.2 Network Configuration

• Install, configure and manage a network connection.


6.6

Application Delivery

2.3 Application Delivery

• Configure a Windows system for automatic updates.


6.7

Network Troubleshooting

4.2 Network Configuration

• Troubleshoot network connections.

6.8

Networking Careers


7.0

Databases


7.1

Chapter Introduction


7.2

Introduction to Databases

5.1 Database Access

• Use Microsoft Access to explore database objects.


7.3

Relational Databases

5.1 Database Access

• Create database tables using Microsoft Access.

• Create table relationships using Microsoft Access.


7.4

Querying Databases

5.2 Database Queries

• Use Microsoft Access to perform basic queries.

• Write SQL commands to retrieve all data from a table.

• Write SQL commands to retrieve data matching criteria.

• Write SQL commands to add and delete records.


7.5

Non-relational Databases


7.6

Database Careers


8.0

Programming


8.1

Chapter Introduction


8.2

Programming Overview


8.3

Programming Fundamentals

6.1 Programming Fundamentals

• Use JavaScript to create an If... Else statement.

• Use JavaScript to define and call a function.

• Use JavaScript to create for loop and a while loop.


8.4

Programming Paradigms and Processes


8.5

Web Development

6.2 Web Development

• Use HTML tags for head, body, ordered list, and unordered list.

• Use HTML to add headings, images and hyperlinks to a web page.

• Use HTML to Link a CSS file to an HTML page.

• Create CSS Style sheets to add a drop shadow to an element.

• Create CSS style sheets to resize an image and change a font.

• Use JavaScript to add functionality to a button on a web page.


8.6

Programming Careers


9.0

Information Systems


9.1

Chapter Introduction


9.2

Introduction to Business Systems


9.3

Data Analysis

2.1 Applications

• Use Microsoft Excel Tables and Charts to analyze data.

5.1 Database Access

• Use Microsoft Access Reports to Analyze Data.


9.4

Designing and Implementing Systems


9.5

Intellectual Property


9.6

Information System Careers


10.1

Chapter Introduction


10.2

Security Threats

7.2 Device Security

• Evaluate possible social engineering exploits.


10.3

Authentication

7.2 Device Security

• Configure access control and authentication.


10.4

Data Encryption

7.1 Device Security

• Secure a home wireless network.

7.2 Device Security

• Configure File Encryption.


10.5

Device Security

7.1 Device Security

• Configure Windows Defender to protect your home computer.

• Configure Windows Firewall for different networks.

• Configure remote wipe on a device.

7.2 Device Security

• Configure access control and authentication.


10.6

Business Continuity Plans

1.3 Storage

• Create volumes and format drives.

7.1 Device Security

• Install and configure a UPS.

7.2 Device Security

• Configure Windows backup settings.

• Configure and restore data using File History.


10.7

Cybersecurity Careers


11.0

IT Career Preparation


11.2

Education and Training


11.3

Finding a Job


A.0

TestOut IT Fundamentals Pro - Practice Exam


A.1

Prepare for TestOut IT Fundamentals Pro Certification


A.2

TestOut IT Fundamentals Pro Question Review


B.0

CompTIA IT Fundamentals (FC0-U61) - Practice Exams


B.1

Prepare for CompTIA IT Fundamentals FC0-U61 Certification


B.2

CompTIA IT Fundamentals FC0-U61 Domain Review (20 Questions)


B.3

CompTIA IT Fundamentals FC0-U61 Domain Review (All Questions)


A.1.3 How to take the Pro Exam

To take the TestOut IT Fundamentals Pro Certification exam, it must first be scheduled by an instructor or an administrator.

You are encouraged to budget your time and to keep moving through the exam so you can complete it within the time limit. Begin an exam at the scheduled exam time. Students follow these steps to start the exam:

1. You must be logged in to LabSim.


2. Select the Certifications tab from the top navigation menu.

3. Navigate to the certification.


4. Select Start Exam and read the instructions.


5. When you are ready to begin the exam, select Start Exam .


Exam Notes

• When you purchase a TestOut course, the Pro Certification exam is included with the course. The course must have an active license to take the exam.


• Unlike the practice exams, the TestOut Pro certification exams are assessment exams that do not allow students to check their answers or get instant feedback.


• The exam may be attempted only once per exam voucher.


• If you do not pass the exam, you may purchase a retake exam voucher online.


• Do not click Start Exam until you are ready to complete the certification exam. Starting the exam and exiting will use the exam voucher.


A.1.4 Pro Exam FAQs

TestOut Pro Certification Frequently Asked Questions (FAQs)

For the most up-to-date TestOut Pro Certification FAQs, visit TestOut Pro Certification at http://www.testout.com/certification/pro-exams/Resources/FAQs .

A.2 TestOut IT Fundamentals Pro Question Review

This section is a practice review that contains all the questions related to the TestOut IT Fundamentals Pro exam. Use these questions to prepare for the TestOut IT Fundamentals Pro exam.

The questions in this section are not randomly generated, and you will receive the same set of questions each time you open a new practice session.

This practice review has:

• 105 lab simulations


• No time limit


• No pass/fail score


• A percentage score at the end of the session


The student's score should not be used as part of the student's grade. This section is meant to be used as a practice review only. If you need to include a score in the student's grade, use the TestOut IT Fundamentals Pro Certification Practice Exam score.

After you finish the practice review, you can print the score report to use for further review.

A.2.1 Pro Objective 1: Hardware (Section Quiz)

A.2.2 Pro Objective 2: Software (Section Quiz)

A.2.3 Pro Objective 3: Operating Systems (Section Quiz)

A.2.4 Pro Objective 4: Networking (Section Quiz)

A.2.5 Pro Objective 5: Databases (Section Quiz)

A.2.6 Pro Objective 6: Programming (Section Quiz)

A.2.7 Pro Objective 7: IT Systems and Security (Section Quiz)

A.3 TestOut IT Fundamentals Pro Certification Practice Exam (Section Quiz)

B.0 CompTIA IT Fundamentals (FC0-U61) - Practice Exams

B.1 Prepare for CompTIA IT Fundamentals FC0-U61 Certification

It is important to prepare for an exam by studying course material, practicing skills, and committing new concepts to memory. You can use the instruction and tests in this course to help you prepare more efficiently.

We recommend that you take the following steps as you prepare for the CompTIA IT Fundamentals exam: Step

Description


Step 1: Study the Course Material

Study the course materials for each section .

The course materials include text lessons, demonstrations, video lessons, and hands-on labs. As you work through the course, follow these hints for the most effective study:

• Review the learning and exam objectives on each section page. The objectives outline the knowledge and skills you'll need for the official certification exam.


• Watch the videos.


• Watch the demonstrations.


• Read all text lesson fact pages.


• Practice the tasks in the lab simulations until you feel comfortable with your ability to complete them.


• Even if you already know the material, a review will be helpful when preparing for an exam.


Step 2: Take the Section Practice Quizzes

Pass all the Section Quizzes and be able to explain why the answers are correct.

The Section Quizzes at the end of each section will help you assess your understanding of the content for that section.

• Use the immediate feedback to go back and study the course material covering the questions you missed.


• After you have mastered the material in a section, move on to the next section.


Step 3: Study the Domain Review Questions

Study the Domain Review questions for each domain.

When you have finished studying the course material and passed all the Section Quizzes, you are ready to focus on exam preparation and review questions by certification exam domain. There are two types available:

• 20 Questions - Twenty questions are randomly selected from the available pool of questions for a specific exam domain.


• All Questions - All questions from the available pool of questions for a specific exam domain are presented. This option allows the review of all available questions by exam domain.


Step 4: Take the Certification Practice Exam

Pass the Certification Practice Exam with at least a 95% passing score.

After you are confident with your ability to answer each question, take the certification practice exam to assess your preparedness to take the certification exam.

• This exam has roughly the same number of questions and time limit as the certification exam.


• Check your answers after each exam, then review the course material for questions that you missed.


• Practice questions are designed to assess your knowledge as it relates to the exam objectives.


• Focus your time on understanding the topics covered in the objectives and not on memorizing answers, as the actual certification exam will have a different set of questions.


• It is recommended that you pass the Certification Practice Exam multiple times as you will receive random questions each time.


• When you feel confident in your understanding of the exam objectives and topics, the next step is to take the certification exam.


Step 5: Schedule and Take the Certification Exam

When you have completed the previous steps and feel prepared, schedule the CompTIA IT Fundamentals exam through Pearson VUE. Details on how to schedule an exam are provided in this section.


B.1.1 FC0-U61 Exam Objectives

The TestOut IT Fundamentals Pro course and certification exam cover the following CompTIA IT Fundamentals objectives:

#

Domain Module.Section


1.0

IT Concepts and Terminology


1.1

Compare and contrast notational systems.

• Binary


• Hexadecimal


• Decimal


• Data representation o ASCII o Unicode


2.3

1.2

Compare and contrast fundamental data types and their characteristics. 8.2, 8.3


• Char


• Strings


• Numbers o Integers o Floats


• Boolean


1.3

Illustrate the basics of computing and processing.

• Input


• Processing


• Output


• Storage


2.2


1.4

Explain the value of data and information.

• Data and information as assets


• Importance of investing in security


• Relationship of data to creating information


• Intellectual property o Trademarks


o Copyright


o Patents


• Digital products

• Data-driven business decisions o Data capture and collection


o Data correlation


o Meaningful reporting


9.2, 9.3, 9.5


1.5

Compare and contrast common units of measure.

• Storage unit o Bit


o Byte


o KB


o MB


o GB


o TB


o PB


• Throughput unit o bps


o Kbps


o Mbps


o Gbps


o Tbps


• Processing speed o MHz


o GHz


2.3

1.6

Explain the troubleshooting methodology. 3.6


• Identify the problem o Gather information


o Duplicate the problem, if possible


o Question users


o Identify symptoms


o Determine if anything has changed


o Approach multiple problems individually


• Research knowledge base/Internet, if applicable


• Establish a theory of probable cause o Question the obvious


o Consider multiple approaches (e.g. divide and conquer)


• Test the theory to determine the cause o Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem


o If the theory is not confirmed, establish a new theory or escalate


• Establish a plan of action to resolve the problem and identify potential effects


• Implement the solution or escalate as necessary


• Verify full system functionality and, if applicable, implement preventive measures


• Document findings/lessons learned, actions, and outcomes


2.0

Infrastructure


2.1

Classify common types of input/output device interfaces.

• Networking o Wired (Telephone connector (RJ-11); Ethernet connector (RJ-45)) o Wireless (Bluetooth; NFC)


• Peripheral device o USB


o FireWire


o Thunderbolt


o Bluetooth


o RF


• Graphic device o VGA


o HDMI


o DVI


o DisplayPort


o Mini DisplayPort


3.4

6.2, 6.3


2.2

Given a scenario, set up and install common peripheral devices to a laptop/PC.

• Devices o Printer


o Scanner


o Keyboard


o Mouse


o Camera


o External hard drive


o Speakers


o Display

o Plug-and-play vs. driver installation


o Other required steps


o IP-based peripherals


o Web-based configuration steps


3.4, 3.5


• Installation types


2.3

Explain the purpose of common internal computing components.

• Motherboard/system board


• Firmware/BIOS


• RAM


• CPU o ARM (Mobile phone; Tablet)


o 32-bit (Laptop; Workstation; Server)


o 64-bit (Laptop; Workstation; Server)


• Storage o Hard drive


o SSD


• GPU


• Cooling


• NIC o Wired vs. wireless


o On-board vs. add-on card

3.3, 3.5

4.3


2.4

Compare and contrast common Internet service types.

• Fiber optic


• Cable


• DSL


• Wireless o Radio frequency


o Satellite


o Cellular


5.2

6.4


2.5

Compare and contrast storage types.

• Volatile vs. non-volatile


• Local storage types o RAM


o Hard drive (Solid state vs. spinning disk)


o Optical


o Flash drive


• Local network storage types o NAS


o File server


• Cloud storage service


3.5

5.4

6.2

10.6


2.6

Compare and contrast common computing devices and their purposes.

• Mobile phones


3.2

4.2

5.2, 5.6, 5.7


• Tablets


• Laptops


• Workstations


• Servers


• Gaming consoles


• IoT o Home appliances


o Home automation devices (Thermostats; Security systems)


o Modern cars


o IP cameras


o Streaming media devices


o Medical devices


6.2


2.7

Explain basic networking concepts.

• Basics of network communication o Basics of packet transmission


o DNS (URL-to-IP translation)


o LAN vs. WAN


• Device addresses o IP address

o MAC address


• Basic protocols o HTTP/S


o POP3


o IMAP


o SMTP


• Devices o Modem


o Router


o Switch


o Access point


o Firewall


5.2

6.2, 6.4, 6.5


2.8

Given a scenario, install, configure and secure a basic wireless network.

• 802.11a/b/g/n/ac o Older vs. newer standards


o Speed limitations


o Interference and attenuation factors


• Best practices o Change SSID


o Change default password


o Encrypted vs. unencrypted (Open: Captive portal; WEP; WPA; WPA2)

6.3


3.0

Applications and Software


3.1

Explain the purpose of operating systems.

• Interface between applications and hardware


• Disk management


• Process management/scheduling o Kill process/end task


o Mobile device OS


o Workstation OS


o Server OS


o Embedded OS (Firmware)


o Hypervisor (Type 1)


3.5

4.2, 4.3, 4.5, 4.6, 4.7


• Application management


• Memory management


• Device management


• Access control/protection


• Types of OS


3.2

Compare and contrast components of an operating system.

• File systems and features o File systems (NTFS; FAT32; HFS; Ext4)


• Features o Compression

o Encryption


o Permissions


o Journaling


o Limitations


o Naming rules


• File management o Folders/directories


o File types and extensions


o Permissions


• Services


• Processes


• Drivers


• Utilities o Task scheduling


• Interfaces o Console/command line


o GUI


2.4

3.5

4.2, 4.3, 4.4, 4.6, 4.7

6.6


3.3

Explain the purpose and proper use of software.

• Productivity software o Word processing software


o Spreadsheet software


o Presentation software

o Web browser


o Visual diagramming software


• Collaboration software o Email client


o Conferencing software


o Instant messaging software


o Online workspace


o Document sharing


• Business software o Database software


o Project management software


o Business-specific applications


o Accounting software


4.5, 4.6

5.2, 5.3, 5.4, 5.6, 5.8

6.5

9.2


3.4

Explain methods of application architecture and delivery models.

• Application delivery methods o Locally installed (Network not required; Application exists locally; Files saved locally)


o Local network hosted (Network required; Internet access not required)


o Cloud hosted (Internet access required; Service required; Files saved in the cloud)


• Application architecture models o One tier

o Two tier


o Three tier


o n-tier


5.4

6.6


3.5

Given a scenario, configure and use web browsers.

• Caching/clearing cache


• Deactivate client-side scripting


• Browser add-ons/extensions o Add


o Remove


o Enable/disable


• Private browsing


• Proxy settings


• Certificates o Valid


o Invalid


• Popup blockers


• Script blockers


• Compatible browser for application(s)


5.3, 5.8


3.6

Compare and contrast general application concepts and uses.

• Single-platform software


• Cross-platform software o Compatibility concerns

• Licensing o Single use


o Group use/site license


o Concurrent license


o Open source vs. proprietary


o Subscription vs. one-time purchase


o Product keys and serial numbers


• Software installation best practices o Reading instructions


o Reading agreements


o Advanced options


6.6


4.0

Software Development Concepts


4.1

Compare and contrast programming language categories.

• Interpreted o Scripting languages


o Scripted languages


o Markup languages


• Compiled programming languages


• Query languages


• Assembly language


7.3, 7.4

8.2, 8.4, 8.5


4.2

Given a scenario, use programming organizational techniques and interpret logic.

• Organizational techniques o Pseudocode concepts o Flow-chart concepts (Sequence)


• Logic components o Branching o Looping


8.2, 8.3


4.3

Explain the purpose and use of programming concepts.

• Identifiers o Variables o Constants


• Containers o Arrays o Vectors


• Functions


• Objects o Properties


o Attributes


o Methods


8.2, 8.3, 8.4


5.0

Database Fundamentals

5.1

Explain database concepts and the purpose of a database.

• Usage of database o Create


o Import/input


o Query


o Reports


• Flat file vs. database o Multiple concurrent users


o Scalability


o Speed


o Variety of data


• Records


• Storage o Data persistence


7.2, 7.3, 7.4, 7.5


5.2

Compare and contrast various database structures.

• Structured vs. semi-structured vs. non-structured


• Relational databases o Schema


o Tables (Rows/records; Fields/columns - Primary key, Foreign key; Constraints)


• Non-relational databases o Key/value databases


o Document databases

7.3, 7.5


5.3

Summarize methods used to interface with databases.

• Relational methods o Data manipulation (Select; Insert; Delete; Update) o Data definition (Create; Alter; Drop; Permissions)


• Database access methods o Direct/manual access


o Programmatic access


o User interface/utility access


o Query/report builders


• Export/import o Database dump


o Backup


7.2, 7.3, 7.4


6.0

Security


6.1

Summarize confidentiality, integrity and availability concerns.

• Confidentiality concerns o Snooping


o Eavesdropping


o Wiretapping


o Social engineering


o Dumpster diving


• Integrity concerns o Man-in-the-middle

o Replay attack


o Impersonation


o Unauthorized information alteration


• Availability concerns o Denial of service


o Power outage


o Hardware failure


o Destruction


o Service outage


10.2


6.2

Explain methods to secure devices and best practices.

• Securing devices (mobile/workstation) o Antivirus/Anti-malware


o Host firewall


o Changing default passwords


o Enabling passwords


o Safe browsing practices


o Patching/updates


o Software sources (Validating legitimate sources; Researching legitimate sources; OEM websites vs. third-party websites)


o Removal of unwanted software


o Removal of unnecessary software


o Removal of malicious software


6.6

10.5

• Device use best practices


6.3

Summarize behavioral security concepts.

• Expectations of privacy when using: o The Internet (Social networking sites; Email; File sharing; Instant messaging)


o Mobile applications


o Desktop software


o Business software


o Corporate network


• Written policies and procedures


• Handling of confidential information o Passwords


o Personal information


o Customer information


o Company confidential information


5.5

10.2, 10.6


6.4

Compare and contrast authentication, authorization, accounting and non-repudiation concepts.

• Authentication o Single factor


o Multifactor


o Examples of factors (Password; PIN; One-time password; Software token; Hardware token; Biometrics; Specific location; Security questions)


o Single sign-on


• Authorization o Permissions

o Least privilege model


o Role-based access (User account types)


o Rule-based access


o Mandatory access controls


o Discretionary access controls


• Accounting o Logs


o Tracking


o Web browser history


• Non-repudiation o Video


o Biometrics


o Signature


o Receipt


10.3


6.5

Explain password best practices.

• Password length


• Password complexity


• Password history


• Password expiration


• Password reuse across sites


• Password managers


• Password reset process

10.5


6.6

Explain common uses of encryption.

• Plain text vs. cipher text


• Data at rest o File level o Disk level


• Data in transit o Email


o HTTPS


o VPN


o Mobile application


6.5, 6.6

10.4, 10.5


6.7

Explain business continuity concepts.

• Fault tolerance o Replication


o Redundancy (Data; Network; Power)


o Backup considerations (Data - File backups, Critical data, Database, OS backups; Location - Stored Locally, Cloud Storage, On-site vs. off-site)


o Contingency plan


• Disaster recovery o Data restoration


o Prioritization


o Restoring access


10.6

B.1.2 FC0-U61 Exam Objectives by Course Section

The TestOut IT Fundamentals Pro course covers the following CompTIA IT Fundamentals exam objectives: Section

Title Objectives


1.0

Course Overview


1.1

Chapter Introduction


1.2

What Is Information Technology?


1.3

Technology and Ethics


2.0

Information Technology Basics


2.1

Chapter Introduction


2.2

Introduction to Computers

1.3 Illustrate the basics of computing and processing.

• Input

• Processing

• Output

• Storage


2.3

Digital Data

1.1 Compare and contrast notational systems.

• Binary

• Hexadecimal

• Decimal

• Data representation

• ASCII


• Unicode

1.5 Compare and contrast common units of measure.

• Storage unit

• Bit


• Byte


• KB


• MB


• GB


• TB


• PB


• Throughput unit

• bps


• Kbps


• Mbps


• Gbps


• Tbps


• Processing speed

• MHz


• GHz


2.4

Media Formatting

3.2 Compare and contrast components of an operating system.

• Features

• Compression


2.5

Digital Media Careers


3.0

Computer Hardware

3.1

Chapter Introduction


3.2

Computing Devices

2.6 Compare and contrast common computing devices and their purposes.

• Mobile phones

• Tablets

• Laptops

• Workstations


3.3

Internal Components

2.3 Explain the purpose of common internal computing components.

• Motherboard/system board

• Firmware/BIOS

• RAM

• CPU

• ARM (Mobile phone; Tablet)


• 32-bit (Laptop; Workstation; Server)


• 64-bit (Laptop; Workstation; Server)


• GPU

• Cooling

• NIC

• Wired vs. wireless


• On-board vs. add-on card


3.4

Input and Output

2.1 Classify common types of input/output device interfaces.

• Networking

• Wired (Telephone connector (RJ-11); Ethernet connector (RJ-45))


• Wireless (Bluetooth; NFC)


• Peripheral device

• USB


• FireWire

• Thunderbolt


• Bluetooth


• RF


• Graphic device

• VGA


• HDMI


• DVI


• DisplayPort


• Mini DisplayPort


2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC.

• Devices

• Printer


• Scanner


• Keyboard


• Mouse


• Camera


• Speakers


• Display


• Installation types

• Plug-and-play vs. driver installation


• Other required steps


• IP-based peripherals


• Web-based configuration steps


3.5

Storage

2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC.

• Devices

• External hard drive

2.3 Explain the purpose of common internal computing components.

• Storage

• Hard drive


• SSD


2.5 Compare and contrast storage types.

• Volatile vs. non-volatile

• Local storage types


• RAM


• Hard drive (Solid state vs. spinning disk)


• Optical


• Flash drive


3.1 Explain the purpose of operating systems.

• Disk management

3.2 Compare and contrast components of an operating system.

• File systems and features

• File systems (NTFS; FAT32; HFS; Ext4)


• Features

• Compression


• Encryption


• Permissions


• Journaling


• Limitations


• Naming rules


• File management

• Folders/directories


• File types and extensions


• Permissions


3.6

Hardware Troubleshooting

1.6 Explain the troubleshooting methodology.

• Identify the problem

• Gather information


• Duplicate the problem, if possible


• Question users


• Identify symptoms


• Determine if anything has changed


• Approach multiple problems individually


• Research knowledge base/Internet, if applicable

• Establish a theory of probable cause

• Question the obvious


• Consider multiple approaches (e.g. divide and conquer)


• Test the theory to determine the cause


• Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem


• If the theory is not confirmed, establish a new theory or escalate


• Establish a plan of action to resolve the problem and identify potential effects

• Implement the solution or escalate as necessary

• Verify full system functionality and, if applicable, implement preventive measures

• Document findings/lessons learned, actions, and outcomes


3.7

Computer Hardware Careers


4.0

Computer Software


4.1

Chapter Introduction


4.2

Operating Systems

2.6 Compare and contrast common computing devices and their purposes.

• Gaming consoles

3.1 Explain the purpose of operating systems.

• Interface between applications and hardware

• Disk management

• Process management/scheduling

• Kill process/end task


• Application management

• Memory management

• Device management

• Access control/protection

• Types of OS

• Mobile device OS


• Workstation OS


• Server OS


• Embedded OS (Firmware)


• Hypervisor (Type 1)


3.2 Compare and contrast components of an operating system.

• Services

• Processes

• Interfaces

• Console/command line


• GUI


4.3

More System Software

2.3 Explain the purpose of common internal computing components.

• Firmware/BIOS

3.1 Explain the purpose of operating systems.

• Device management

3.2 Compare and contrast components of an operating system.

• Drivers

• Utilities

• Task scheduling


4.4

File Management

3.2 Compare and contrast components of an operating system.

• Features

• Permissions

• File management

• Folders/directories


• File types and extensions


• Permissions


• Interfaces

• GUI


4.5

Application Software

3.1 Explain the purpose of operating systems.

• Application management

• Types of OS

• Workstation OS


3.3 Explain the purpose and proper use of software.

• Productivity software

• Word processing software


• Spreadsheet software


• Presentation software


• Web browser


• Visual diagramming software


• Collaboration software

• Email client


• Conferencing software


• Instant messaging software


• Online workspace


• Document sharing


• Business software

• Database software


• Project management software

• Business-specific applications


• Accounting software


4.6

Printing

3.1 Explain the purpose of operating systems.

• Interface between applications and hardware

• Device management

• Types of OS

• Workstation OS


3.2 Compare and contrast components of an operating system.

• Drivers

• Interfaces

• GUI


3.3 Explain the purpose and proper use of software.

• Productivity software

• Word processing software


4.7

Software Troubleshooting

3.1 Explain the purpose of operating systems.

• Process management/scheduling

• Application management

3.2 Compare and contrast components of an operating system.

• Utilities


• Task scheduling


4.8

System Support Careers


5.0

Internet Technologies


5.1

Chapter Introduction

5.2

The World Wide Web

2.4 Compare and contrast common Internet service types.

• Wireless

• Radio frequency


2.6 Compare and contrast common computing devices and their purposes.

• IoT

2.7 Explain basic networking concepts.

• Basics of network communication

• DNS (URL-to-IP translation)


• Device addresses

• IP address


• Basic protocols

• HTTP/S


3.3 Explain the purpose and proper use of software.

• Productivity software

• Web browser


5.3

Web Browsers

3.3 Explain the purpose and proper use of software.

• Productivity software

• Web browser


3.5 Given a scenario, configure and use web browsers.

• Caching/clearing cache

• Deactivate client-side scripting


• Browser add-ons/extensions

• Add


• Remove


• Enable/disable


• Private browsing

• Proxy settings

• Certificates

• Valid

• Invalid


• Popup blockers

• Script blockers

• Compatible browser for application(s)


5.4

Cloud Computing

2.5 Compare and contrast storage types.

• Cloud storage service

3.3 Explain the purpose and proper use of software.

• Collaboration software

3.4 Explain methods of application architecture and delivery models.

• Application delivery methods

• Cloud hosted (Internet access required; Service required; Files saved in the cloud)


5.5

Social Media

6.3 Summarize behavioral security concepts.

• Expectations of privacy when using:

• The Internet (Social networking sites; Email; File sharing; Instant messaging)


5.6

Internet Communications Technologies

2.6 Compare and contrast common computing devices and their purposes.

• IoT

• Streaming media devices


3.3 Explain the purpose and proper use of software.

• Collaboration software


• Email client


5.7

The Internet of Things

2.6 Compare and contrast common computing devices and their purposes.

• IoT

• Home appliances


• Home automation devices (Thermostats; Security systems)


• Modern cars


• IP cameras

• Streaming media devices


• Medical devices


5.8

Online Research

3.3 Explain the purpose and proper use of software.

• Productivity software

• Web browser


3.5 Given a scenario, configure and use web browsers.

• Compatible browser for application(s)


5.9

Internet Technology Careers


6.0

Networking


6.1

Chapter Introduction


6.2

Networking Basics

2.1 Classify common types of input/output device interfaces.

• Networking

• Wired (Telephone connector (RJ-11); Ethernet connector (RJ-45))


• Wireless (Bluetooth; NFC)


• Peripheral device

• Bluetooth


• RF


2.5 Compare and contrast storage types.

• Local network storage types

• File server


2.6 Compare and contrast common computing devices and their purposes.

• Servers

2.7 Explain basic networking concepts.

• Basics of network communication

• LAN vs. WAN


• Device addresses

• IP address


• MAC address


• Basic protocols

• Devices

• Modem


• Router


• Switch


• Access point


• Firewall


6.3

Wired and Wireless Networking

2.1 Classify common types of input/output device interfaces.

• Networking

• Wired (Telephone connector (RJ-11); Ethernet connector (RJ-45))


2.8 Given a scenario, install, configure and secure a basic wireless network.

• 802.11a/b/g/n/ac

• Older vs. newer standards


• Speed limitations


• Interference and attenuation factors


• Best practices

• Change SSID


• Change default password


• Encrypted vs. unencrypted (Open: Captive portal; WEP; WPA; WPA2)


6.4

Internet Connectivity

2.4 Compare and contrast common Internet service types.

• Fiber optic

• Cable

• DSL

• Wireless

• Radio frequency


• Satellite


• Cellular


2.7 Explain basic networking concepts.

• Devices

• Modem


6.5

Networking Protocols

2.7 Explain basic networking concepts.

• Basics of network communication

• Basics of packet transmission


• DNS (URL-to-IP translation)


• Device addresses

• IP address


• Basic protocols

• HTTP/S


• POP3


• IMAP


• SMTP


3.3 Explain the purpose and proper use of software.

• Collaboration software

• Email client


6.6 Explain common uses of encryption.

• Data in transit

• Email


6.6

Application Delivery

3.2 Compare and contrast components of an operating system.

• Interfaces

• GUI


3.4 Explain methods of application architecture and delivery models.

• Application delivery methods

• Locally installed (Network not required; Application exists locally; Files saved locally)


• Local network hosted (Network required; Internet access not required)


• Cloud hosted (Internet access required; Service required; Files saved in the cloud)


• Application architecture models

• One tier


• Two tier


• Three tier


• n-tier


3.6 Compare and contrast general application concepts and uses.

• Single-platform software

• Cross-platform software

• Compatibility concerns


• Licensing

• Single use


• Group use/site license


• Concurrent license


• Open source vs. proprietary


• Subscription vs. one-time purchase


• Product keys and serial numbers


• Software installation best practices

• Reading instructions


• Reading agreements


• Advanced options


6.2 Explain methods to secure devices and best practices.

• Device use best practices

• Software sources (Validating legitimate sources; Researching legitimate sources; OEM websites vs. third-party websites)


• Removal of unwanted software


• Removal of unnecessary software


• Removal of malicious software


6.6 Explain common uses of encryption.

• Data in transit

• VPN


6.7

Network Troubleshooting


6.8

Networking Careers


7.0

Databases


7.1

Chapter Introduction


7.2

Introduction to Databases

5.1 Explain database concepts and the purpose of a database.

• Usage of database

• Create


• Import/input


• Query


• Reports


5.3 Summarize methods used to interface with databases.

• Database access methods

• User interface/utility access


• Query/report builders

7.3

Relational Databases

4.1 Compare and contrast programming language categories.

• Query languages

5.1 Explain database concepts and the purpose of a database.

• Flat file vs. database

• Multiple concurrent users


• Scalability


• Speed


• Records

• Storage

• Data persistence


5.2 Compare and contrast various database structures.

• Relational databases

• Schema


• Tables (Rows/records; Fields/columns - Primary key, Foreign key; Constraints)


5.3 Summarize methods used to interface with databases.

• Relational methods

• Data manipulation (Select; Insert; Delete; Update)


• Data definition (Create; Alter; Drop; Permissions)


• Export/import

• Database dump


• Backup


7.4

Querying Databases

4.1 Compare and contrast programming language categories.

• Query languages

5.1 Explain database concepts and the purpose of a database.

• Usage of database

• Query

5.3 Summarize methods used to interface with databases.

• Relational methods

• Data manipulation (Select; Insert; Delete; Update)


• Database access methods

• Direct/manual access


• Programmatic access


• User interface/utility access


• Query/report builders


7.5

Non-relational Databases

5.1 Explain database concepts and the purpose of a database.

• Flat file vs. database

• Variety of data


5.2 Compare and contrast various database structures.

• Structured vs. semi-structured vs. non-structured

• Non-relational databases

• Key/value databases


• Document databases


7.6

Database Careers


8.0

Programming


8.1

Chapter Introduction


8.2

Programming Overview

1.2 Compare and contrast fundamental data types and their characteristics.

• Char

• Strings

• Numbers

• Integers

• Floats


• Boolean

4.1 Compare and contrast programming language categories.

• Interpreted

• Scripting languages


• Scripted languages


• Markup languages


• Compiled programming languages

• Query languages

• Assembly language


4.2 Given a scenario, use programming organizational techniques and interpret logic.

• Organizational techniques

• Pseudocode concepts


• Flow-chart concepts (Sequence)


4.3 Explain the purpose and use of programming concepts.

• Identifiers

• Variables


• Constants


• Containers

• Arrays


• Vectors


• Functions

• Objects

• Properties


• Attributes


• Methods


8.3

Programming Fundamentals

1.2 Compare and contrast fundamental data types and their characteristics.

• Char

• Strings

• Numbers

• Integers


• Floats


• Boolean

4.2 Given a scenario, use programming organizational techniques and interpret logic.

• Organizational techniques

• Pseudocode concepts


• Logic components

• Branching


• Looping


4.3 Explain the purpose and use of programming concepts.

• Identifiers

• Variables


• Constants


• Containers

• Arrays


• Functions 8.4

Programming Paradigms and Processes

4.1 Compare and contrast programming language categories.

• Interpreted

4.3 Explain the purpose and use of programming concepts.

• Objects

• Properties


• Attributes


• Methods


8.5

Web Development

4.1 Compare and contrast programming language categories.

• Interpreted

• Scripting languages

• Scripted languages


• Markup languages


8.6

Programming Careers


9.0

Information Systems


9.1

Chapter Introduction


9.2

Introduction to Business Systems

1.4 Explain the value of data and information.

• Data-driven business decisions

• Data capture and collection


• Data correlation


• Meaningful reporting


3.3 Explain the purpose and proper use of software.

• Business software

• Database software


• Project management software


• Business-specific applications


• Accounting software


9.3

Data Analysis

1.4 Explain the value of data and information.

• Data and information as assets

• Importance of investing in security

• Relationship of data to creating information

• Intellectual property

• Trademarks

• Copyright


• Patents


• Digital products

• Data-driven business decisions

• Data capture and collection


• Data correlation


• Meaningful reporting


9.4

Designing and Implementing Systems


9.5

Intellectual Property

1.4 Explain the value of data and information.

• Intellectual property

• Trademarks


• Copyright


• Patents


9.6

Information System Careers


10.0

Cybersecurity


10.1

Chapter Introduction


10.2

Security Threats

6.1 Summarize confidentiality, integrity and availability concerns.

• Confidentiality concerns

• Snooping


• Eavesdropping

• Wiretapping


• Social engineering


• Dumpster diving


• Integrity concerns

• Man-in-the-middle


• Replay attack


• Impersonation


• Unauthorized information alteration


• Availability concerns

• Denial of service


• Power outage


• Hardware failure


• Destruction


• Service outage


6.3 Summarize behavioral security concepts.

• Expectations of privacy when using:

• The Internet (Social networking sites; Email; File sharing; Instant messaging)


• Mobile applications


• Desktop software


• Business software


• Corporate network


10.3

Authentication

6.4 Compare and contrast authentication, authorization, accounting and non-repudiation concepts.

• Authentication

• Single factor


• Multifactor


• Examples of factors (Password; PIN; One-time password; Software token; Hardware token; Biometrics; Specific location; Security questions)

• Single sign-on


• Authorization

• Permissions


• Least privilege model


• Role-based access (User account types)


• Rule-based access


• Mandatory access controls


• Discretionary access controls


• Accounting

• Logs


• Tracking


• Web browser history


• Non-repudiation

• Video


• Biometrics


• Signature


• Receipt


10.4

Data Encryption

6.6 Explain common uses of encryption.

• Plain text vs. cipher text

• Data at rest

• File level


• Disk level


• Data in transit

• Email


• HTTPS

• VPN


• Mobile application


10.5

Device Security

6.2 Explain methods to secure devices and best practices.

• Securing devices (mobile/workstation)

• Antivirus/Anti-malware


• Host firewall


• Changing default passwords


• Enabling passwords


• Safe browsing practices


• Patching/updates


6.5 Explain password best practices.

• Password length

• Password complexity

• Password history

• Password expiration

• Password reuse across sites

• Password managers

• Password reset process


6.6 Explain common uses of encryption.

• Data in transit

• HTTPS


• Mobile application


10.6

Business Continuity Plans

2.5 Compare and contrast storage types.

• Local network storage types

• NAS


• File server


6.3 Summarize behavioral security concepts.

• Written policies and procedures

• Handling of confidential information

• Passwords


• Personal information


• Customer information


• Company confidential information


6.7 Explain business continuity concepts.

• Fault tolerance

• Replication

• Redundancy (Data; Network; Power)

• Backup considerations (Data - File backups, Critical data, Database, OS backups; Location - Stored Locally, Cloud Storage, On-site vs. off-site)

• Contingency plan

• Disaster recovery

• Data restoration

• Prioritization

• Restoring access


10.7

Cybersecurity Careers


11.0

IT Career Preparation


11.1

Chapter Introduction


11.2

Education and Training


11.3

Finding a Job


A.0

TestOut IT Fundamentals Pro - Practice Exam


A.1

Prepare for TestOut IT Fundamentals Pro Certification


A.2

TestOut IT Fundamentals Pro Question Review

B.0

CompTIA IT Fundamentals (FC0-U61) - Practice Exams


B.1

Prepare for CompTIA IT Fundamentals FC0-U61 Certification


B.2

CompTIA IT Fundamentals FC0-U61 Domain Review (20 Questions)


B.3

CompTIA IT Fundamentals FC0-U61 Domain Review (All Questions)


B.1.3 How to take the FC0-U61 Exam

The FC0-U61 exam is scheduled through Pearson VUE. Certification

Provider Website

Customer Service


CompTIA Pearson VUE pearsonvue.com

Online Chat and phone numbers by region are available on pearsonvue.com/comptia/contact


The FC0-U61 exam information webpage on CompTIA's website provides the latest details on how to schedule the exam.

TestOut is pleased to offer students a 10% off coupon code for exam vouchers purchased from CompTIA's online marketplace.

To purchase a voucher, go to the CompTIA website and complete the following:

• Select your desired certification .

• Add the corresponding CompTIA voucher(s) to your shopping cart.

• Enter the coupon code TESTOUT2020 at checkout to get 10% off your purchase.

• Go to the Pearson VUE website.

• Enter your voucher information to register for the certification.

B.1.4 FC0-U61 Exam FAQs

Select a question to jump to its answer.

Where do I take the exam? What do I bring to the exam? What specific information do I need to know to pass the exam? Is there a student discount for the FC0-U61 exam? Is the FC0-U61 exam an adaptive exam? How is the exam administered? What types of questions are on the exam?

How many questions are on an exam, and how long do I have to complete it? How soon after I take the exam will I know whether I've passed it? If I don't pass the exam, can I retake it?

Where do I take an exam?

When you schedule the exam with Pearson VUE, you will be presented with options to take the exam at a local testing center or at your home or office. If you choose at a local testing center, you will be given the option to pick from the

testing centers closest to your location. Back to top

What do I bring to the exam?

You will need two forms of identification, one with a picture. For example, you could use a driver's license and a credit card. You will typically receive an erasable marker and whiteboard or laminated paper to use during the exam. Notes or other reference material are not allowed inside the testing center. It is recommended that you do not bring personal items to the testing center, however, they typically provide a locker to store personal items.

Back to top

What specific information do I need to know to pass the exam?

People often ask, "What's on the exam?" This course is intended to help you gain the knowledge, skills, and abilities necessary to perform the corresponding job roles. Additionally, we highly recommend that you use the certification practice exam to prepare for the FC0-U61 exam.

The questions on certification exams are protected to maintain the integrity of the exam. While the practice exam does not include the exact questions, it will help measure your understanding of the topics covered in the CompTIA objectives. You should review the FC0-U61 exam objectives and make sure you are comfortable with each topic and objective listed. After taking the practice exam, the objectives for the exam are listed on the Report screen. You can use the report to focus your studies to prepare for the exam.

Back to top

Is there a student discount for the FC0-U61 exam?

CompTIA does offer discounts on their exam vouchers and also academic pricing for students through the academic store. Check the exam information page and www.comptia.org/blog/voucher-discount for more information. TestOut is pleased to offer students a 10% off coupon code for exam vouchers purchased from CompTIA's online marketplace.

Back to top

Is the FC0-U61 exam an adaptive exam?

The FC0-U61 exam and the certification practice exam are not adaptive tests. The certification practice exam is the best way to prepare for taking the certification exam because the content of the objectives for an exam are more comprehensive than any single adaptive test. Adaptive tests are too short to give you a thorough review and the chance to practice taking the test. You need to understand all of the questions before you take the certification exam.

An adaptive exam begins by giving you an easy-to-moderate question. If you answer the question correctly, it gives you a more difficult question. With each correct answer, the difficulty of the next question increases. On the other hand, if you answer the second question incorrectly, the next questions will be easier. The test changes the question difficulty until it determines your skill level.

There are two primary characteristics you will notice as you take an adaptive exam:

• You cannot skip questions or review previously answered questions. This means that you need to take a little more time to answer each question carefully before going on to the next question. Adaptive exams display a warning screen at the beginning of the exam stating that you will not be allowed to review previous questions.

• Adaptive tests are typically shorter than traditional exams. The current adaptive exams range between 15 and 35 questions.

Back to top

How is the exam administered?

Certification exams are all computer-based. At the beginning of the exam, you will have an opportunity to view a tutorial on the exam software. Time spent reviewing the tutorial does not count towards the time you have to take the exam.

Back to top

What types of questions are on the exam?

The FC0-U61 exam has mostly multiple-choice questions. Additionally, there are a few performance-based questions at the start of the exam and some drag-and-drop activities. The CompTIA website provided sample questions and also information on performance-based questions.

Back to top

How many questions are on an exam and how long do I have to complete it?

The FC0-U61 exam has a maximum of 75 questions and 60 minutes to complete the exam. Back to top

How soon after I take the exam will I know whether I've passed it?

You will receive results as soon as you have completed the exam. The testing program provides immediate feedback and automatically generates a report showing the required passing score and your score. Pick up your exam report before you

leave the testing center. You should keep this report in case there are any discrepancies in your certification program. Back to top

If I don't pass the exam, can I retake it?

For the FC0-U61 exam, see the CompTIA website for exam policies. Typically, there is no waiting period before attempting the retake the exam a second time, however the 3rd and subsequent attempts have a waiting period. See the CompTIA website for specific information on the retake policy.

Back to top

B.1.5 Hints and Tips for taking the FC0-U61 Exam

Follow these tips to make your exam experience less stressful and more successful:

When Tips


Before the Exam

Before you take the exam, try these tips:

• Prepare a short review sheet for the exam. It should contain reference tables and information that you have trouble remembering. Shortly before you start the exam, study your notes as a last-minute review.

• Arrive 20 minutes early and relax for a few minutes before the exam. Take a deep breath. Look at the review sheet one last time. You will make fewer mistakes if you are not tense and rushed.

• Before the exam starts, review the exam tutorial to familiarize yourself with the exam. The time you spend on the orientation exam does not count toward the test time. If you have any questions, ask the exam administrator before the exam begins. The exam is timed, so make sure you ask questions before the test begins.


During the Exam

Once the exam has started:

• If you are unsure of a question's answer, eliminate the obviously incorrect answers first. Eliminating the obvious makes it easier for you to try to select the correct answer, especially if you have to guess.

• If you don't know, guess! Be sure you answer all of the questions before you finish. Unanswered questions are wrong and scored as incorrect answers. If you are unsure of an answer, make an educated guess. There is no extra penalty for incorrect answers.

• If you have time, review your answers before going on to the next question. A word of caution: be absolutely sure before you change an answer! If you are positive that your answer is wrong, change it. But if you are not sure and cannot explain to yourself why you need to change an answer, leave it. Most of the time, your first instinct is correct.


Use Scratch Pad

You will be given an erasable marker and a whiteboard or laminated paper to use during the exam. Follow these tips for using the scratch pad:

• Immediately after the exam starts, write down anything that could be a useful reference during the exam. This is the time to remember what you studied on your review sheet. The information on the review sheet should be fresh in your mind, because you just did a quick review. Write lists, reference tables, and any other vital information on the paper. Don't spend a lot of time, just a minute or two writing down reference material. The list of information will save you time as you answer the questions.

• While answering questions, use the scratch pad to draw diagrams. A question may be easier to answer after you see a diagram.


Retake an Exam

If you do not pass the exam:

• Use the score report on your transcript to identify the areas to focus further study.

• Think carefully about the exam and make notes about the questions that you couldn't answer. Do this as soon as possible after taking the exam. Look up the correct answers in your study materials. You may get the same or similar questions the next time.

• Don't wait too long to retake the exam. You already know much of the material, and you may forget what you know if you wait too long.


B.2 CompTIA IT Fundamentals FC0-U61 Domain Review (20 Questions)

This section contains six domain practice reviews related to the CompTIA IT Fundamentals FC0-U61 domains. The domain practices:

• Have 20 questions per domain review

• Are randomly generated

• Have no time limit

• Are not pass/fail

• Have a percentage score at the end of the session

This section is meant to be used as a practice review only, not as a graded assignment. If a graded assignment is needed, use the CompTIA IT Fundamentals FC0-U61 Certification Practice Exam score.

With these study questions, you can:

• Check your answers as you go to obtain immediate feedback.

• Skip questions, return to previous questions, and mark questions for later review.

• Repeat questions as many times as needed. After you finish the study questions, you can:

• Review each question by selecting the Individual Responses option.

• Expand questions marked as incorrect to see the correct answer and an accompanying explanation.

• Print the score report to use for further review.

B.2.1 FC0-U61 Domain 1: Concepts and Terminology (Section Quiz)

B.2.2 FC0-U61 Domain 2: Infrastructure (Section Quiz)

B.2.3 FC0-U61 Domain 3: Applications and Software (Section Quiz)

B.2.4 FC0-U61 Domain 4: Software Development (Section Quiz)

B.2.5 FC0-U61 Domain 5: Database Fundamentals (Section Quiz)

B.2.6 FC0-U61 Domain 6: Security (Section Quiz)

B.3 CompTIA IT Fundamentals FC0-U61 Domain Review (All Questions)

This section contains all of the TestOut questions related to the CompTIA IT Fundamentals FC0-U61 exam. Use these questions to prepare yourself for the CompTIA IT Fundamentals FC0-U61 exam.

The questions in this section are not randomly generated, and you will receive the same set of questions each time you open a new practice session.

This practice review has:

• 322 questions

• No time limit

• No pass/fail

• A percentage score at the end of the session

This section is meant to be used as a practice review only, not as a graded assignment. If a graded assignment is needed, use the CompTIA IT Fundamentals FC0-U61 Certification Practice Exam score.

With these study questions, you can:

• Check your answers as you go to obtain immediate feedback.

• Skip questions, return to previous questions, and mark questions for later review.

• Repeat questions as many times as needed. After you finish the study questions, you can:

• Review each question by selecting the Individual Responses option.

• Expand questions marked as incorrect to see the correct answer and an explanation of the correct answer.

• Print the score report to use for further review.

B.3.1 FC0-U61 Domain 1: Concepts and Terminology (Section Quiz)

B.3.2 FC0-U61 Domain 2: Infrastructure (Section Quiz)

B.3.3 FC0-U61 Domain 3: Applications and Software (Section Quiz)

B.3.4 FC0-U61 Domain 4: Software Development (Section Quiz)

B.3.5 FC0-U61 Domain 5: Database Fundamentals (Section Quiz)

B.3.6 FC0-U61 Domain 6: Security (Section Quiz)

B.4 CompTIA IT Fundamentals FC0-U61 Certification Practice Exam (Section Quiz) Totals:

Section files: 73 Text lessons: 179 Videos: 142 Demos: 86 Sims: 104